<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-23T06:33:34</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20102322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2322</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2322" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2322" ref_url="https://www.suse.com/security/cve/CVE-2010-2322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AJWN7K3ZWIZYG5QW25KKFIGISFYTG2R3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHWHBBR2CBRHE7HR6PAPJLGHP3QCHYHS/" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a full pathname for a file within a .jar archive, a related issue to CVE-2010-0831.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2010-2322/">CVE-2010-2322</cve>
	<bugzilla href="https://bugzilla.suse.com/1188517">SUSE bug 1188517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629523" comment="fastjar-0.98-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627142" comment="fastjar is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4953" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4953" ref_url="https://www.suse.com/security/cve/CVE-2011-4953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0557-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4953/">CVE-2011-4953</cve>
	<bugzilla href="https://bugzilla.suse.com/757062">SUSE bug 757062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5325</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5325" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653806" comment="busybox-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653807" comment="busybox-static-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2395" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2395" ref_url="https://www.suse.com/security/cve/CVE-2012-2395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in action_power.py in Cobbler 2.2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) username or (2) password fields to the power_system method in the xmlrpc API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2395/">CVE-2012-2395</cve>
	<bugzilla href="https://bugzilla.suse.com/763610">SUSE bug 763610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10401" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10401" ref_url="https://www.suse.com/security/cve/CVE-2014-10401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMGB54ZNHPYCQOCNFWII4FF7QYGHLHOE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43QNN7Q3HNDCS2NCHIGGBFFQET5XKUHO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10401/">CVE-2014-10401</cve>
	<bugzilla href="https://bugzilla.suse.com/1176492">SUSE bug 1176492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612170" comment="perl-DBI-1.642-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10402" ref_url="https://www.suse.com/security/cve/CVE-2014-10402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMGB54ZNHPYCQOCNFWII4FF7QYGHLHOE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43QNN7Q3HNDCS2NCHIGGBFFQET5XKUHO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-10402/">CVE-2014-10402</cve>
	<bugzilla href="https://bugzilla.suse.com/1176492">SUSE bug 1176492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612170" comment="perl-DBI-1.642-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611949" comment="apache-commons-httpclient-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151783" comment="apache-commons-httpclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611950" comment="apache-commons-httpclient-demo-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298607" comment="apache-commons-httpclient-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611951" comment="apache-commons-httpclient-javadoc-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298608" comment="apache-commons-httpclient-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611952" comment="apache-commons-httpclient-manual-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298609" comment="apache-commons-httpclient-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3414</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5262</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611949" comment="apache-commons-httpclient-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151783" comment="apache-commons-httpclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611950" comment="apache-commons-httpclient-demo-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298607" comment="apache-commons-httpclient-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611951" comment="apache-commons-httpclient-javadoc-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298608" comment="apache-commons-httpclient-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611952" comment="apache-commons-httpclient-manual-3.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298609" comment="apache-commons-httpclient-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9542" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KXPRDBUQG5DRAA3TWBMKHHZP4CR2QEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42BXAKC6WUYJZ65BBT2CMMJRVQFPVQI3/" source="SUSE-SU"/>
    <description>
    add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615043" comment="pam_radius-1.4.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009478582" comment="pam_radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615044" comment="pam_radius-32bit-1.4.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009478583" comment="pam_radius-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1560-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LDTHO3OJZ2XD7I3ONIRIUSKEMP42OY2/" source="SUSE-SU"/>
    <description>
    The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228</cve>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659492" comment="glibc-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659493" comment="glibc-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659494" comment="glibc-devel-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659495" comment="glibc-devel-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659496" comment="glibc-devel-static-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659497" comment="glibc-devel-static-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659498" comment="glibc-extra-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659499" comment="glibc-html-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659500" comment="glibc-i18ndata-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659501" comment="glibc-info-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659502" comment="glibc-locale-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659503" comment="glibc-locale-base-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659504" comment="glibc-locale-base-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659505" comment="glibc-profile-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659506" comment="glibc-profile-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659507" comment="glibc-utils-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659508" comment="glibc-utils-32bit-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659509" comment="nscd-2.26-lp152.26.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2124</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656595" comment="ctdb-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656596" comment="ctdb-pcp-pmda-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656597" comment="ctdb-tests-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656598" comment="libdcerpc-binding0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656599" comment="libdcerpc-binding0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656600" comment="libdcerpc-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656601" comment="libdcerpc-samr-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656602" comment="libdcerpc-samr0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656603" comment="libdcerpc-samr0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656604" comment="libdcerpc0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656605" comment="libdcerpc0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656606" comment="libndr-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656607" comment="libndr-krb5pac-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656608" comment="libndr-krb5pac0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656609" comment="libndr-krb5pac0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656610" comment="libndr-nbt-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656611" comment="libndr-nbt0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656612" comment="libndr-nbt0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656613" comment="libndr-standard-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656614" comment="libndr-standard0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656615" comment="libndr-standard0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656616" comment="libndr0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656617" comment="libndr0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656618" comment="libnetapi-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656619" comment="libnetapi-devel-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656620" comment="libnetapi0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656621" comment="libnetapi0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656622" comment="libsamba-credentials-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656623" comment="libsamba-credentials0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656624" comment="libsamba-credentials0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656625" comment="libsamba-errors-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656626" comment="libsamba-errors0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656627" comment="libsamba-errors0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656628" comment="libsamba-hostconfig-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656629" comment="libsamba-hostconfig0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656630" comment="libsamba-hostconfig0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656631" comment="libsamba-passdb-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656632" comment="libsamba-passdb0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656633" comment="libsamba-passdb0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656634" comment="libsamba-policy-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656635" comment="libsamba-policy-python3-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656636" comment="libsamba-policy0-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656637" comment="libsamba-policy0-python3-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656638" comment="libsamba-util-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656639" comment="libsamba-util0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656640" comment="libsamba-util0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656641" comment="libsamdb-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656642" comment="libsamdb0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656643" comment="libsamdb0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656644" comment="libsmbclient-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656645" comment="libsmbclient0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656646" comment="libsmbclient0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656647" comment="libsmbconf-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656648" comment="libsmbconf0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656649" comment="libsmbconf0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656650" comment="libsmbldap-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656651" comment="libsmbldap2-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656652" comment="libsmbldap2-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656653" comment="libtevent-util-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656654" comment="libtevent-util0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656655" comment="libtevent-util0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656656" comment="libwbclient-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656657" comment="libwbclient0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656658" comment="libwbclient0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656659" comment="samba-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656660" comment="samba-ad-dc-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656661" comment="samba-ad-dc-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656662" comment="samba-ceph-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656663" comment="samba-client-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656664" comment="samba-client-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656665" comment="samba-core-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656666" comment="samba-doc-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656667" comment="samba-dsdb-modules-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656668" comment="samba-libs-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656669" comment="samba-libs-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656670" comment="samba-libs-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656671" comment="samba-libs-python3-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656672" comment="samba-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656673" comment="samba-test-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656674" comment="samba-winbind-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656675" comment="samba-winbind-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3822" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3822" ref_url="https://www.suse.com/security/cve/CVE-2016-3822" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3822/">CVE-2016-3822</cve>
	<bugzilla href="https://bugzilla.suse.com/1108480">SUSE bug 1108480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108672">SUSE bug 1108672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5100</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5100" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5100" ref_url="https://www.suse.com/security/cve/CVE-2016-5100" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAUIVTQVXK6DU6ZXURWINSWBU3EBTIT7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0450-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YQHL4MI6XNUZ25CJOTEP4PACP46MIOF/" source="SUSE-SU"/>
    <description>
    Froxlor before 0.9.35 uses the PHP rand function for random number generation, which makes it easier for remote attackers to guess the password reset token by predicting a value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5100/">CVE-2016-5100</cve>
	<bugzilla href="https://bugzilla.suse.com/1025193">SUSE bug 1025193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613696" comment="froxlor-0.10.23-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347739" comment="froxlor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6209</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6209" ref_url="https://www.suse.com/security/cve/CVE-2016-6209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RCXDSKLLDI4CG7PLAOOYGYVNNNQLL5WP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGYA3HEIHYY2MWEAOFFMZUBPGWKUXYI2/" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Nagios.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6209/">CVE-2016-6209</cve>
	<bugzilla href="https://bugzilla.suse.com/989759">SUSE bug 989759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614619" comment="nagios-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614620" comment="nagios-contrib-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614621" comment="nagios-devel-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614622" comment="nagios-theme-exfoliation-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614623" comment="nagios-www-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614624" comment="nagios-www-dch-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html" source="SUSE-SU"/>
    <description>
    perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610356" comment="perl-XML-Twig-3.52-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289040" comment="perl-XML-Twig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000369</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000369" ref_url="https://www.suse.com/security/cve/CVE-2017-1000369" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000369/">CVE-2017-1000369</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044692">SUSE bug 1044692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000469</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000469" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the "add repo" component resulting in arbitrary code execution as root user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469</cve>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11104</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11104" ref_url="https://www.suse.com/security/cve/CVE-2017-11104" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00049.html" source="SUSE-SU"/>
    <description>
    Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11104/">CVE-2017-11104</cve>
	<bugzilla href="https://bugzilla.suse.com/1047841">SUSE bug 1047841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610159" comment="knot-1.6.8-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177609" comment="knot is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063963">SUSE bug 1063963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13082</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13086</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14132</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16943</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16943" ref_url="https://www.suse.com/security/cve/CVE-2017-16943" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-16943/">CVE-2017-16943</cve>
	<bugzilla href="https://bugzilla.suse.com/1069857">SUSE bug 1069857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16944</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16944" ref_url="https://www.suse.com/security/cve/CVE-2017-16944" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-16944/">CVE-2017-16944</cve>
	<bugzilla href="https://bugzilla.suse.com/1069859">SUSE bug 1069859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WBPEYN3HS4LO455EQKPMEZAUTFZIRGMT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FQSQDG6EG5IGZXIQVLQHFSBMALXOT6L6/" source="SUSE-SU"/>
    <description>
    The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640</cve>
	<bugzilla href="https://bugzilla.suse.com/1159488">SUSE bug 1159488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186088">SUSE bug 1186088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615022" comment="snakeyaml-1.28-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477984" comment="snakeyaml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615023" comment="snakeyaml-javadoc-1.28-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477985" comment="snakeyaml-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18922" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18926" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV22LIOLBYBTTH7G7HNENHDQDYBB4WP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXCAHUNNGDFKLSCGKPLLGBYG4BM2FW4J/" source="SUSE-SU"/>
    <description>
    raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178784">SUSE bug 1178784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183914">SUSE bug 1183914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612041" comment="libraptor-devel-2.0.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299308" comment="libraptor-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612042" comment="libraptor2-0-2.0.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151673" comment="libraptor2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612043" comment="libraptor2-0-32bit-2.0.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299309" comment="libraptor2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612044" comment="raptor-2.0.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299310" comment="raptor is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libjasper/jpc/jpc_dec.c in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The dec_clnpass function in libjasper/jpc/jpc_t1dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5504" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_undo_roi function in libjasper/jpc/jpc_dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jas_matrix_asl function in jas_seq.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632139" comment="spectre-meltdown-checker-0.44-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275301" comment="spectre-meltdown-checker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9271</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9271" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB5G3FIS4OQH3FX723SLMBOC4P37HKHV/" source="SUSE-SU"/>
    <description>
    The commandline package update tool zypper writes HTTP proxy credentials into its logfile, allowing local attackers to gain access to proxies used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271</cve>
	<bugzilla href="https://bugzilla.suse.com/1050625">SUSE bug 1050625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614218" comment="libzypp-17.25.5-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161722" comment="libzypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614219" comment="libzypp-devel-17.25.5-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161723" comment="libzypp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614220" comment="libzypp-devel-doc-17.25.5-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161724" comment="libzypp-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614221" comment="yast2-installation-4.2.48-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341737" comment="yast2-installation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614222" comment="zypper-1.14.41-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251910" comment="zypper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614223" comment="zypper-aptitude-1.14.41-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251911" comment="zypper-aptitude is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614224" comment="zypper-log-1.14.41-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251912" comment="zypper-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614225" comment="zypper-needs-restarting-1.14.41-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262480" comment="zypper-needs-restarting is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9782" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000225" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000225" ref_url="https://www.suse.com/security/cve/CVE-2018-1000225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. This attack appear to be exploitable via "network connectivity". Sending unauthenticated JavaScript payload to the Cobbler XMLRPC API (/cobbler_api).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000225/">CVE-2018-1000225</cve>
	<bugzilla href="https://bugzilla.suse.com/1104190">SUSE bug 1104190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105442">SUSE bug 1105442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000226</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000226" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000226" ref_url="https://www.suse.com/security/cve/CVE-2018-1000226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000226/">CVE-2018-1000226</cve>
	<bugzilla href="https://bugzilla.suse.com/1104190">SUSE bug 1104190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105440">SUSE bug 1105440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105442">SUSE bug 1105442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131852">SUSE bug 1131852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653806" comment="busybox-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653807" comment="busybox-static-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653806" comment="busybox-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653807" comment="busybox-static-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000667" ref_url="https://www.suse.com/security/cve/CVE-2018-1000667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000667/">CVE-2018-1000667</cve>
	<bugzilla href="https://bugzilla.suse.com/1107592">SUSE bug 1107592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10016" ref_url="https://www.suse.com/security/cve/CVE-2018-10016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc0 has a division-by-zero vulnerability in the expr5 function in asm/eval.c via a malformed input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10016/">CVE-2018-10016</cve>
	<bugzilla href="https://bugzilla.suse.com/1089084">SUSE bug 1089084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00073.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library in Graphviz 2.40.1 allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610752" comment="graphviz-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167847" comment="graphviz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610753" comment="graphviz-devel-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167849" comment="graphviz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610754" comment="graphviz-doc-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167851" comment="graphviz-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610755" comment="graphviz-gd-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167853" comment="graphviz-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610756" comment="graphviz-gnome-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167855" comment="graphviz-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610757" comment="graphviz-guile-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167857" comment="graphviz-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610758" comment="graphviz-gvedit-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167859" comment="graphviz-gvedit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610759" comment="graphviz-java-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167861" comment="graphviz-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610760" comment="graphviz-lua-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167863" comment="graphviz-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610761" comment="graphviz-perl-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167865" comment="graphviz-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610762" comment="graphviz-php-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167867" comment="graphviz-php is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610763" comment="graphviz-plugins-core-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254560" comment="graphviz-plugins-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610764" comment="graphviz-python-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167871" comment="graphviz-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610765" comment="graphviz-ruby-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167873" comment="graphviz-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610766" comment="graphviz-smyrna-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167875" comment="graphviz-smyrna is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610767" comment="graphviz-tcl-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167877" comment="graphviz-tcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610768" comment="libgraphviz6-2.40.1-lp152.7.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254561" comment="libgraphviz6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10254" ref_url="https://www.suse.com/security/cve/CVE-2018-10254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10254/">CVE-2018-10254</cve>
	<bugzilla href="https://bugzilla.suse.com/1090519">SUSE bug 1090519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10316</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10316" ref_url="https://www.suse.com/security/cve/CVE-2018-10316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc0 has an endless while loop in the assemble_file function of asm/nasm.c because of a globallineno integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10316/">CVE-2018-10316</cve>
	<bugzilla href="https://bugzilla.suse.com/1090840">SUSE bug 1090840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10538" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10931</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10931" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0046-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7UG4FHNZKUU44UQUG34HXRAOJ27FI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMYIPRTLRGECRYU5WNXDNCYJJGURZSTT/" source="SUSE-SU"/>
    <description>
    It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931</cve>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104190">SUSE bug 1104190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105440">SUSE bug 1105440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105442">SUSE bug 1105442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130105">SUSE bug 1130105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613806" comment="cobbler-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229446" comment="cobbler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613807" comment="cobbler-tests-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229447" comment="cobbler-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613808" comment="cobbler-web-3.1.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229448" comment="cobbler-web is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBRNNZMHWDSWWFESWQDTSNE4Q5NETCUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGBVRVIJEOW5LG3NVS52NA3VNX37UM7D/" source="SUSE-SU"/>
    <description>
    The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311</cve>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632549" comment="libxerces-c-3_1-3.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632550" comment="libxerces-c-3_1-32bit-3.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153271" comment="libxerces-c-3_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632551" comment="libxerces-c-devel-3.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153272" comment="libxerces-c-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632552" comment="xerces-c-3.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153273" comment="xerces-c is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632553" comment="xerces-c-doc-3.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252435" comment="xerces-c-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631327" comment="libsndfile-devel-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631328" comment="libsndfile-progs-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631329" comment="libsndfile1-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631330" comment="libsndfile1-32bit-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13405</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631858" comment="libmspack-devel-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238457" comment="libmspack-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631859" comment="libmspack0-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631860" comment="libmspack0-32bit-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238458" comment="libmspack0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631861" comment="mspack-tools-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247101" comment="mspack-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631858" comment="libmspack-devel-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238457" comment="libmspack-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631859" comment="libmspack0-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631860" comment="libmspack0-32bit-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238458" comment="libmspack0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631861" comment="mspack-tools-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247101" comment="mspack-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631858" comment="libmspack-devel-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238457" comment="libmspack-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631859" comment="libmspack0-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631860" comment="libmspack0-32bit-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238458" comment="libmspack0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631861" comment="mspack-tools-0.6-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247101" comment="mspack-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15473</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMNIMCAHIBHI4ABCI2JE3E6E2SYDAP2T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F33WEA5KQR7XFYMXJPGRCG4IZX75GFRO/" source="SUSE-SU"/>
    <description>
    OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652716" comment="ssh-audit-2.5.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652725" comment="ssh-audit is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611174" comment="libqt4-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611175" comment="libqt4-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611176" comment="libqt4-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611177" comment="libqt4-devel-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611178" comment="libqt4-devel-doc-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611179" comment="libqt4-devel-doc-data-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611180" comment="libqt4-linguist-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611181" comment="libqt4-private-headers-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611182" comment="libqt4-qt3support-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611183" comment="libqt4-qt3support-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611184" comment="libqt4-sql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611185" comment="libqt4-sql-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611186" comment="libqt4-sql-postgresql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611187" comment="libqt4-sql-sqlite-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611188" comment="libqt4-sql-sqlite-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611189" comment="libqt4-sql-unixODBC-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611190" comment="libqt4-x11-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611191" comment="libqt4-x11-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611192" comment="qt4-x11-tools-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16382" ref_url="https://www.suse.com/security/cve/CVE-2018-16382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has a buffer over-read in x86/regflags.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-16382/">CVE-2018-16382</cve>
	<bugzilla href="https://bugzilla.suse.com/1106878">SUSE bug 1106878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16517" ref_url="https://www.suse.com/security/cve/CVE-2018-16517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16517/">CVE-2018-16517</cve>
	<bugzilla href="https://bugzilla.suse.com/1107594">SUSE bug 1107594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16554</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16554" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16554" ref_url="https://www.suse.com/security/cve/CVE-2018-16554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-16554/">CVE-2018-16554</cve>
	<bugzilla href="https://bugzilla.suse.com/1108480">SUSE bug 1108480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108672">SUSE bug 1108672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16999" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16999" ref_url="https://www.suse.com/security/cve/CVE-2018-16999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16999/">CVE-2018-16999</cve>
	<bugzilla href="https://bugzilla.suse.com/1108404">SUSE bug 1108404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17088" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17088" ref_url="https://www.suse.com/security/cve/CVE-2018-17088" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:3481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17088/">CVE-2018-17088</cve>
	<bugzilla href="https://bugzilla.suse.com/1108480">SUSE bug 1108480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108672">SUSE bug 1108672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751</cve>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610715" comment="gettext-csharp-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290347" comment="gettext-csharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610716" comment="gettext-java-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290348" comment="gettext-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610717" comment="gettext-runtime-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290349" comment="gettext-runtime is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610718" comment="gettext-runtime-32bit-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290350" comment="gettext-runtime-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610719" comment="gettext-runtime-mini-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290351" comment="gettext-runtime-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610720" comment="gettext-runtime-mini-tools-doc-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290352" comment="gettext-runtime-mini-tools-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610721" comment="gettext-runtime-tools-doc-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290353" comment="gettext-runtime-tools-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610722" comment="gettext-tools-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290354" comment="gettext-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610723" comment="gettext-tools-mini-0.19.8.1-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290355" comment="gettext-tools-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18836</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18836" ref_url="https://www.suse.com/security/cve/CVE-2018-18836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7QJRCOF3ZVZ6YHKSI4ITV4ND423PKJLT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FAP6JAFARKZJ5UHCVX7ILV3IJZVIGVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B3RB4W3NEKHZUPUSNCSRLXDVEK64S5SL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18836/">CVE-2018-18836</cve>
	<bugzilla href="https://bugzilla.suse.com/1139094">SUSE bug 1139094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614474" comment="netdata-1.29.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353393" comment="netdata is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18837</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18837" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18837" ref_url="https://www.suse.com/security/cve/CVE-2018-18837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7QJRCOF3ZVZ6YHKSI4ITV4ND423PKJLT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FAP6JAFARKZJ5UHCVX7ILV3IJZVIGVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B3RB4W3NEKHZUPUSNCSRLXDVEK64S5SL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Netdata 1.10.0. HTTP Header Injection exists via the api/v1/data filename parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18837/">CVE-2018-18837</cve>
	<bugzilla href="https://bugzilla.suse.com/1139095">SUSE bug 1139095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614474" comment="netdata-1.29.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353393" comment="netdata is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18838" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18838" ref_url="https://www.suse.com/security/cve/CVE-2018-18838" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7QJRCOF3ZVZ6YHKSI4ITV4ND423PKJLT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FAP6JAFARKZJ5UHCVX7ILV3IJZVIGVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B3RB4W3NEKHZUPUSNCSRLXDVEK64S5SL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Netdata 1.10.0. Log Injection (or Log Forgery) exists via a %0a sequence in the url parameter to api/v1/registry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18838/">CVE-2018-18838</cve>
	<bugzilla href="https://bugzilla.suse.com/1139098">SUSE bug 1139098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614474" comment="netdata-1.29.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353393" comment="netdata is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18839" ref_url="https://www.suse.com/security/cve/CVE-2018-18839" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7QJRCOF3ZVZ6YHKSI4ITV4ND423PKJLT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FAP6JAFARKZJ5UHCVX7ILV3IJZVIGVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B3RB4W3NEKHZUPUSNCSRLXDVEK64S5SL/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in Netdata 1.10.0. Full Path Disclosure (FPD) exists via api/v1/alarms. NOTE: the vendor says "is intentional."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18839/">CVE-2018-18839</cve>
	<bugzilla href="https://bugzilla.suse.com/1144517">SUSE bug 1144517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614474" comment="netdata-1.29.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353393" comment="netdata is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<bugzilla href="https://bugzilla.suse.com/1114495">SUSE bug 1114495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19214" ref_url="https://www.suse.com/security/cve/CVE-2018-19214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19214/">CVE-2018-19214</cve>
	<bugzilla href="https://bugzilla.suse.com/1115795">SUSE bug 1115795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19215" ref_url="https://www.suse.com/security/cve/CVE-2018-19215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for the special cases of the % and $ and ! characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19215/">CVE-2018-19215</cve>
	<bugzilla href="https://bugzilla.suse.com/1115774">SUSE bug 1115774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19216" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19216" ref_url="https://www.suse.com/security/cve/CVE-2018-19216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) before 2.13.02 has a use-after-free in detoken at asm/preproc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19216/">CVE-2018-19216</cve>
	<bugzilla href="https://bugzilla.suse.com/1115758">SUSE bug 1115758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19387" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19387" ref_url="https://www.suse.com/security/cve/CVE-2018-19387" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00020.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19387/">CVE-2018-19387</cve>
	<bugzilla href="https://bugzilla.suse.com/1116887">SUSE bug 1116887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615251" comment="tmux-3.1c-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298611" comment="tmux is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19432" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631327" comment="libsndfile-devel-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631328" comment="libsndfile-progs-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631329" comment="libsndfile1-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631330" comment="libsndfile1-32bit-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19758" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125575">SUSE bug 1125575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631327" comment="libsndfile-devel-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631328" comment="libsndfile-progs-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631329" comment="libsndfile1-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631330" comment="libsndfile1-32bit-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19840" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19841</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19841" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<bugzilla href="https://bugzilla.suse.com/1120929">SUSE bug 1120929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19869</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869</cve>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611174" comment="libqt4-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611175" comment="libqt4-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611176" comment="libqt4-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611177" comment="libqt4-devel-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611178" comment="libqt4-devel-doc-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611179" comment="libqt4-devel-doc-data-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611180" comment="libqt4-linguist-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611181" comment="libqt4-private-headers-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611182" comment="libqt4-qt3support-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611183" comment="libqt4-qt3support-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611184" comment="libqt4-sql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611185" comment="libqt4-sql-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611186" comment="libqt4-sql-postgresql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611187" comment="libqt4-sql-sqlite-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611188" comment="libqt4-sql-sqlite-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611189" comment="libqt4-sql-unixODBC-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611190" comment="libqt4-x11-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611191" comment="libqt4-x11-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611192" comment="qt4-x11-tools-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611174" comment="libqt4-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611175" comment="libqt4-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611176" comment="libqt4-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611177" comment="libqt4-devel-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611178" comment="libqt4-devel-doc-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611179" comment="libqt4-devel-doc-data-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611180" comment="libqt4-linguist-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611181" comment="libqt4-private-headers-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611182" comment="libqt4-qt3support-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611183" comment="libqt4-qt3support-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611184" comment="libqt4-sql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611185" comment="libqt4-sql-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611186" comment="libqt4-sql-postgresql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611187" comment="libqt4-sql-sqlite-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611188" comment="libqt4-sql-sqlite-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611189" comment="libqt4-sql-unixODBC-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611190" comment="libqt4-x11-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611191" comment="libqt4-x11-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611192" comment="qt4-x11-tools-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20340</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    Yubico libu2f-host 1.1.6 contains unchecked buffers in devs.c, which could enable a malicious token to exploit a buffer overflow. An attacker could use this to attempt to execute malicious code using a crafted USB device masquerading as a security token on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614774" comment="libu2f-host-devel-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614775" comment="libu2f-host-doc-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614776" comment="libu2f-host0-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614777" comment="u2f-host-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20570" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    jp2_encode in jp2/jp2_enc.c in JasPer 2.0.14 has a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 has a memory leak in base/jas_malloc.c in libjasper.a when "--output-format jp2" is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653806" comment="busybox-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653807" comment="busybox-static-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6612</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6612" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6612" ref_url="https://www.suse.com/security/cve/CVE-2018-6612" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0419-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6612/">CVE-2018-6612</cve>
	<bugzilla href="https://bugzilla.suse.com/1079349">SUSE bug 1079349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<bugzilla href="https://bugzilla.suse.com/1079746">SUSE bug 1079746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6789" ref_url="https://www.suse.com/security/cve/CVE-2018-6789" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6789/">CVE-2018-6789</cve>
	<bugzilla href="https://bugzilla.suse.com/1079832">SUSE bug 1079832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7253</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7253" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<bugzilla href="https://bugzilla.suse.com/1081692">SUSE bug 1081692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<bugzilla href="https://bugzilla.suse.com/1081693">SUSE bug 1081693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7544" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614668" comment="openvpn-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152221" comment="openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614669" comment="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157252" comment="openvpn-auth-pam-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614670" comment="openvpn-devel-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157253" comment="openvpn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614671" comment="openvpn-down-root-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157254" comment="openvpn-down-root-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8881" ref_url="https://www.suse.com/security/cve/CVE-2018-8881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8881/">CVE-2018-8881</cve>
	<bugzilla href="https://bugzilla.suse.com/1086228">SUSE bug 1086228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8882</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8882" ref_url="https://www.suse.com/security/cve/CVE-2018-8882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a stack-based buffer under-read in the function ieee_shr in asm/float.c via a large shift value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8882/">CVE-2018-8882</cve>
	<bugzilla href="https://bugzilla.suse.com/1086227">SUSE bug 1086227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8883</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8883" ref_url="https://www.suse.com/security/cve/CVE-2018-8883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a buffer over-read in the parse_line function in asm/parser.c via uncontrolled access to nasm_reg_flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8883/">CVE-2018-8883</cve>
	<bugzilla href="https://bugzilla.suse.com/1086186">SUSE bug 1086186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612775" comment="nasm-2.14.02-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609986" comment="ntp-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609987" comment="ntp-doc-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9252" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_abstorelstepsize in libjasper/jpc/jpc_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611193" comment="jasper-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611194" comment="libjasper-devel-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611195" comment="libjasper4-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611196" comment="libjasper4-32bit-2.0.14-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10067</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10067" ref_url="https://www.suse.com/security/cve/CVE-2019-10067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-10067/">CVE-2019-10067</cve>
	<bugzilla href="https://bugzilla.suse.com/1133754">SUSE bug 1133754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139406">SUSE bug 1139406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010301</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010301" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010301" ref_url="https://www.suse.com/security/cve/CVE-2019-1010301" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-1010301/">CVE-2019-1010301</cve>
	<bugzilla href="https://bugzilla.suse.com/1144316">SUSE bug 1144316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010302</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010302" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010302" ref_url="https://www.suse.com/security/cve/CVE-2019-1010302" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010302/">CVE-2019-1010302</cve>
	<bugzilla href="https://bugzilla.suse.com/1144354">SUSE bug 1144354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010319</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<bugzilla href="https://bugzilla.suse.com/1141334">SUSE bug 1141334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2368-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192368-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<bugzilla href="https://bugzilla.suse.com/1144065">SUSE bug 1144065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613247" comment="buildah-1.19.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613248" comment="libcontainers-common-20210112-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613249" comment="podman-2.2.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613250" comment="podman-cni-config-2.2.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10215" ref_url="https://www.suse.com/security/cve/CVE-2019-10215" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
    <description>
    Bootstrap-3-Typeahead after version 4.0.2 is vulnerable to a cross-site scripting flaw in the highlighter() function. An attacker could exploit this via user interaction to execute code in the user's browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10215/">CVE-2019-10215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610164" comment="dracut-saltboot-0.1.1590413773.a959db7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10740" ref_url="https://www.suse.com/security/cve/CVE-2019-10740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10740/">CVE-2019-10740</cve>
	<bugzilla href="https://bugzilla.suse.com/1131801">SUSE bug 1131801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1267-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html" source="SUSE-SU"/>
    <description>
    The agroot() function in cgraph\obj.c in libcgraph.a in Graphviz 2.39.20160612.1140 has a NULL pointer dereference, as demonstrated by graphml2gv.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612689" comment="graphviz-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167847" comment="graphviz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612690" comment="graphviz-devel-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167849" comment="graphviz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612691" comment="graphviz-doc-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167851" comment="graphviz-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612692" comment="graphviz-gd-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167853" comment="graphviz-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612693" comment="graphviz-gnome-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167855" comment="graphviz-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612694" comment="graphviz-guile-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167857" comment="graphviz-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612695" comment="graphviz-gvedit-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167859" comment="graphviz-gvedit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612696" comment="graphviz-java-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167861" comment="graphviz-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612697" comment="graphviz-lua-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167863" comment="graphviz-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612698" comment="graphviz-perl-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167865" comment="graphviz-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612699" comment="graphviz-php-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167867" comment="graphviz-php is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612700" comment="graphviz-plugins-core-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254560" comment="graphviz-plugins-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612701" comment="graphviz-python-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167871" comment="graphviz-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612702" comment="graphviz-ruby-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167873" comment="graphviz-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612703" comment="graphviz-smyrna-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167875" comment="graphviz-smyrna is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612704" comment="graphviz-tcl-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167877" comment="graphviz-tcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612705" comment="libgraphviz6-2.40.1-lp152.7.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254561" comment="libgraphviz6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<bugzilla href="https://bugzilla.suse.com/1133384">SUSE bug 1133384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555</cve>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12248</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12248" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12248" ref_url="https://www.suse.com/security/cve/CVE-2019-12248" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12248/">CVE-2019-12248</cve>
	<bugzilla href="https://bugzilla.suse.com/1137615">SUSE bug 1137615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXHYC7MWI2M6Y32ROZZBS5HOZOAF2HAN/" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420</cve>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186513">SUSE bug 1186513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614154" comment="perl-Mail-SpamAssassin-3.4.5-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261407" comment="perl-Mail-SpamAssassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614155" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261408" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614156" comment="spamassassin-3.4.5-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261409" comment="spamassassin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12497" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12497" ref_url="https://www.suse.com/security/cve/CVE-2019-12497" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. In the customer or external frontend, personal information of agents (e.g., Name and mail address) can be disclosed in external notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12497/">CVE-2019-12497</cve>
	<bugzilla href="https://bugzilla.suse.com/1137614">SUSE bug 1137614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12746" ref_url="https://www.suse.com/security/cve/CVE-2019-12746" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then be potentially abused in order to impersonate the agent user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12746/">CVE-2019-12746</cve>
	<bugzilla href="https://bugzilla.suse.com/1141430">SUSE bug 1141430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13207" ref_url="https://www.suse.com/security/cve/CVE-2019-13207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" source="SUSE-SU"/>
    <description>
    nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13207/">CVE-2019-13207</cve>
	<bugzilla href="https://bugzilla.suse.com/1182952">SUSE bug 1182952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615256" comment="nsd-4.3.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338518" comment="nsd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13314" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13314" ref_url="https://www.suse.com/security/cve/CVE-2019-13314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00026.html" source="SUSE-SU"/>
    <description>
    virt-bootstrap 1.1.0 allows local users to discover a root password by listing a process, because this password may be present in the --root-password option to virt_bootstrap.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13314/">CVE-2019-13314</cve>
	<bugzilla href="https://bugzilla.suse.com/1140750">SUSE bug 1140750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611790" comment="python2-virt-bootstrap-1.0.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297785" comment="python2-virt-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611791" comment="python3-virt-bootstrap-1.0.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297786" comment="python3-virt-bootstrap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13377</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13377" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377</cve>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13457</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13457" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13457" ref_url="https://www.suse.com/security/cve/CVE-2019-13457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8. A customer user can use the search results to disclose information from their "company" tickets (with the same CustomerID), even when the CustomerDisableCompanyTicketAccess setting is turned on.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13457/">CVE-2019-13457</cve>
	<bugzilla href="https://bugzilla.suse.com/1141431">SUSE bug 1141431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13458" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13458" ref_url="https://www.suse.com/security/cve/CVE-2019-13458" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, and Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS notification tags in templates in order to disclose hashed user passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13458/">CVE-2019-13458</cve>
	<bugzilla href="https://bugzilla.suse.com/1141431">SUSE bug 1141431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141432">SUSE bug 1141432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2463-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFAVEMB6RSGK626NYU5HGZQL46KEPIB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGSHRLXRLM6QT7N73JKYMSATV36M64Q6/" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612016" comment="libSDL-1_2-0-1.2.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251318" comment="libSDL-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612017" comment="libSDL-1_2-0-32bit-1.2.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251319" comment="libSDL-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612018" comment="libSDL-devel-1.2.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251320" comment="libSDL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612019" comment="libSDL-devel-32bit-1.2.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251321" comment="libSDL-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14250</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630546" comment="transfig-3.2.8a-lp152.6.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611197" comment="ovmf-201911-lp152.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611198" comment="ovmf-tools-201911-lp152.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611199" comment="qemu-ovmf-ia32-201911-lp152.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611200" comment="qemu-ovmf-x86_64-201911-lp152.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611201" comment="qemu-ovmf-x86_64-debug-201911-lp152.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7TLVCW5VHXA7SSOSARLTBRZWC5MH642/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Y57O2IBBHBOVJBEVV6JAOZWLGF53QFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2IF5TPLLS7U2RNC42HXIHTRUMS4Q6YV/" source="SUSE-SU"/>
    <description>
    Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612512" comment="ovmf-201911-lp152.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612513" comment="ovmf-tools-201911-lp152.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612514" comment="qemu-ovmf-ia32-201911-lp152.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612515" comment="qemu-ovmf-x86_64-201911-lp152.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612516" comment="qemu-ovmf-x86_64-debug-201911-lp152.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614228" comment="shim-15.4-lp152.4.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html" source="SUSE-SU"/>
    <description>
    _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611306" comment="libtiff-devel-4.0.9-lp152.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611307" comment="libtiff-devel-32bit-4.0.9-lp152.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611308" comment="libtiff5-4.0.9-lp152.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611309" comment="libtiff5-32bit-4.0.9-lp152.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611310" comment="tiff-4.0.9-lp152.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
    <description>
    In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043</cve>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610164" comment="dracut-saltboot-0.1.1590413773.a959db7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612684" comment="grafana-7.0.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612685" comment="grafana-piechart-panel-1.4.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291398" comment="grafana-piechart-panel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612686" comment="grafana-status-panel-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291399" comment="grafana-status-panel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15126" ref_url="https://www.suse.com/security/cve/CVE-2019-15126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZGJOQCY3UVCSZY3XFCDUYHPVWB2IH7T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15126/">CVE-2019-15126</cve>
	<bugzilla href="https://bugzilla.suse.com/1167162">SUSE bug 1167162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662403" comment="kernel-firmware-20200107-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662404" comment="ucode-amd-20200107-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15232" ref_url="https://www.suse.com/security/cve/CVE-2019-15232" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7ZOGH7UAC6Q7OJHR62KOMWS64YF4G73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVAIO7EGOGXSM6FEUKEC7Y4DAXYMXOPX/" source="SUSE-SU"/>
    <description>
    Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15232/">CVE-2019-15232</cve>
	<bugzilla href="https://bugzilla.suse.com/1146283">SUSE bug 1146283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615190" comment="libBasicUsageEnvironment1-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615191" comment="libUsageEnvironment3-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615192" comment="libgroupsock30-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479974" comment="libgroupsock30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615193" comment="libliveMedia94-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479975" comment="libliveMedia94 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615194" comment="live555-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615195" comment="live555-devel-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15522" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15522" ref_url="https://www.suse.com/security/cve/CVE-2019-15522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N2TJY6NFDWNM4LSW3EQT7J74KIUPFSIZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-15522/">CVE-2019-15522</cve>
	<bugzilla href="https://bugzilla.suse.com/1147137">SUSE bug 1147137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615021" comment="csync2-2.0+git.1461714863.10636a4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477847" comment="csync2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15523" ref_url="https://www.suse.com/security/cve/CVE-2019-15523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N2TJY6NFDWNM4LSW3EQT7J74KIUPFSIZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15523/">CVE-2019-15523</cve>
	<bugzilla href="https://bugzilla.suse.com/1147139">SUSE bug 1147139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615021" comment="csync2-2.0+git.1461714863.10636a4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477847" comment="csync2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15890</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15945" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945</cve>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15946</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15946" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946</cve>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180082">SUSE bug 1180082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16091</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16091" ref_url="https://www.suse.com/security/cve/CVE-2019-16091" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Symonics libmysofa 0.7 has an out-of-bounds read in directblockRead in hdf/fractalhead.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16091/">CVE-2019-16091</cve>
	<bugzilla href="https://bugzilla.suse.com/1149919">SUSE bug 1149919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16092</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16092" ref_url="https://www.suse.com/security/cve/CVE-2019-16092" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Symonics libmysofa 0.7 has a NULL pointer dereference in getHrtf in hrtf/reader.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-16092/">CVE-2019-16092</cve>
	<bugzilla href="https://bugzilla.suse.com/1149920">SUSE bug 1149920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16093</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16093" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16093" ref_url="https://www.suse.com/security/cve/CVE-2019-16093" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Symonics libmysofa 0.7 has an invalid write in readOHDRHeaderMessageDataLayout in hdf/dataobject.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-16093/">CVE-2019-16093</cve>
	<bugzilla href="https://bugzilla.suse.com/1149922">SUSE bug 1149922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16094</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16094" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16094" ref_url="https://www.suse.com/security/cve/CVE-2019-16094" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Symonics libmysofa 0.7 has an invalid read in readOHDRHeaderMessageDataLayout in hdf/dataobject.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16094/">CVE-2019-16094</cve>
	<bugzilla href="https://bugzilla.suse.com/1149924">SUSE bug 1149924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16095" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16095" ref_url="https://www.suse.com/security/cve/CVE-2019-16095" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Symonics libmysofa 0.7 has an invalid read in getDimension in hrtf/reader.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16095/">CVE-2019-16095</cve>
	<bugzilla href="https://bugzilla.suse.com/1149926">SUSE bug 1149926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613975" comment="hostapd-2.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16375</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16375" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16375" ref_url="https://www.suse.com/security/cve/CVE-2019-16375" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-16375/">CVE-2019-16375</cve>
	<bugzilla href="https://bugzilla.suse.com/1153324">SUSE bug 1153324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156431">SUSE bug 1156431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00052.html" source="SUSE-SU"/>
    <description>
    Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611667" comment="hunspell-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153301" comment="hunspell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611668" comment="hunspell-devel-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153303" comment="hunspell-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611669" comment="hunspell-devel-32bit-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153304" comment="hunspell-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611670" comment="hunspell-tools-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153306" comment="hunspell-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611671" comment="libhunspell-1_6-0-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296727" comment="libhunspell-1_6-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611672" comment="libhunspell-1_6-0-32bit-1.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296728" comment="libhunspell-1_6-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785</cve>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612014" comment="python2-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612015" comment="python3-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786</cve>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612014" comment="python2-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612015" comment="python3-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789</cve>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612014" comment="python2-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612015" comment="python3-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792</cve>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612014" comment="python2-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612015" comment="python3-waitress-1.4.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16928</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16928" ref_url="https://www.suse.com/security/cve/CVE-2019-16928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-16928/">CVE-2019-16928</cve>
	<bugzilla href="https://bugzilla.suse.com/1152507">SUSE bug 1152507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137508">SUSE bug 1137508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137510">SUSE bug 1137510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1787</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137513">SUSE bug 1137513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18179</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18179" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18179" ref_url="https://www.suse.com/security/cve/CVE-2019-18179" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.12, and Community Edition 5.0.x through 5.0.38 and 6.0.x through 6.0.23. An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, even tickets in a queue where the attacker doesn't have permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18179/">CVE-2019-18179</cve>
	<bugzilla href="https://bugzilla.suse.com/1157001">SUSE bug 1157001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157523">SUSE bug 1157523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18180" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18180" ref_url="https://www.suse.com/security/cve/CVE-2019-18180" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Improper Check for filenames with overly long extensions in PostMaster (sending in email) or uploading files (e.g. attaching files to mails) of ((OTRS)) Community Edition and OTRS allows an remote attacker to cause an endless loop. This issue affects: OTRS AG: ((OTRS)) Community Edition 5.0.x version 5.0.38 and prior versions; 6.0.x version 6.0.23 and prior versions. OTRS AG: OTRS 7.0.x version 7.0.12 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18180/">CVE-2019-18180</cve>
	<bugzilla href="https://bugzilla.suse.com/1157001">SUSE bug 1157001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157524">SUSE bug 1157524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPZ3M35XR5IQLIBDLZFFWGW6Z6SM7YNW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
    <description>
    A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614731" comment="fribidi-1.0.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475532" comment="fribidi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614732" comment="fribidi-devel-1.0.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475533" comment="fribidi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614733" comment="libfribidi0-1.0.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475534" comment="libfribidi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614734" comment="libfribidi0-32bit-1.0.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475535" comment="libfribidi0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18802" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIUODYDMMPC4VZZIR4DRKRPVXGPEDZRO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802</cve>
	<bugzilla href="https://bugzilla.suse.com/1159003">SUSE bug 1159003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613296" comment="libnghttp2-14-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613297" comment="libnghttp2-14-32bit-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177223" comment="libnghttp2-14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613298" comment="libnghttp2-devel-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613299" comment="libnghttp2_asio-devel-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613300" comment="libnghttp2_asio1-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613301" comment="libnghttp2_asio1-32bit-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267106" comment="libnghttp2_asio1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613302" comment="nghttp2-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613303" comment="python3-nghttp2-1.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267108" comment="python3-nghttp2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18906</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18906" ref_url="https://www.suse.com/security/cve/CVE-2019-18906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGYSYGNUS4QKFOUUYGCDWJ7IFEVXEUO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZG2JNQUB6EYLM4HAOZIJV25FIOJAG6B6/" source="SUSE-SU"/>
    <description>
    A Use of Password Hash Instead of Password for Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it. This issue affects: SUSE Linux Enterprise Server for SAP 12-SP5 cryptctl versions prior to 2.4. SUSE Manager Server 4.0 cryptctl versions prior to 2.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18906/">CVE-2019-18906</cve>
	<bugzilla href="https://bugzilla.suse.com/1186226">SUSE bug 1186226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615157" comment="cryptctl-2.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479976" comment="cryptctl is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934</cve>
	<bugzilla href="https://bugzilla.suse.com/1157268">SUSE bug 1157268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612706" comment="libunbound-devel-mini-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612707" comment="libunbound2-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612708" comment="unbound-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612709" comment="unbound-anchor-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612710" comment="unbound-devel-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612711" comment="unbound-munin-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612712" comment="unbound-python-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19244</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19317</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317</cve>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196773">SUSE bug 1196773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196775">SUSE bug 1196775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19462</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19479</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479</cve>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19480</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19480" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480</cve>
	<bugzilla href="https://bugzilla.suse.com/1158307">SUSE bug 1158307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630546" comment="transfig-3.2.8a-lp152.6.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19603</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603</cve>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19645</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19646</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630546" comment="transfig-3.2.8a-lp152.6.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630546" comment="transfig-3.2.8a-lp152.6.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19917" ref_url="https://www.suse.com/security/cve/CVE-2019-19917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19917/">CVE-2019-19917</cve>
	<bugzilla href="https://bugzilla.suse.com/1159714">SUSE bug 1159714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611734" comment="lout-3.40-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297567" comment="lout is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19918" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19918" ref_url="https://www.suse.com/security/cve/CVE-2019-19918" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19918/">CVE-2019-19918</cve>
	<bugzilla href="https://bugzilla.suse.com/1159713">SUSE bug 1159713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611734" comment="lout-3.40-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297567" comment="lout is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXOIPTG34E6FHFZ5MRT6B4BEC5ETU6ML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZ4L5IPYNOJTWC7WZTAMPSFHIGKXQAE/" source="SUSE-SU"/>
    <description>
    libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190329">SUSE bug 1190329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191840">SUSE bug 1191840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192365">SUSE bug 1192365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193380">SUSE bug 1193380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193381">SUSE bug 1193381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632607" comment="libesmtp-1.0.6-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632497" comment="libesmtp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632608" comment="libesmtp-devel-1.0.6-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632498" comment="libesmtp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20005</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to a heap-based buffer over-read while running strchr() starting with a pointer after a '\0' character (where the processing of a string was finished).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml-&gt;txt. This is later deallocated (using free), leading to a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20007</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20007" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20016" ref_url="https://www.suse.com/security/cve/CVE-2019-20016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20016/">CVE-2019-20016</cve>
	<bugzilla href="https://bugzilla.suse.com/1159839">SUSE bug 1159839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20063</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20063" ref_url="https://www.suse.com/security/cve/CVE-2019-20063" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    hdf/dataobject.c in libmysofa before 0.8 has an uninitialized use of memory, as demonstrated by mysofa2json.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20063/">CVE-2019-20063</cve>
	<bugzilla href="https://bugzilla.suse.com/1160040">SUSE bug 1160040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20198</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20198" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_ent_ok() mishandles recursion, leading to stack consumption for a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20199</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20199" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to NULL pointer dereference while running strlen() on a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20200</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20200" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing crafted a XML file, performs incorrect memory handling, leading to a heap-based buffer over-read in the "normalize line endings" feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The ezxml_parse_* functions mishandle XML entities, leading to an infinite loop in which memory allocations occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20202</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20202" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content() tries to use realloc on a block that was not allocated, leading to an invalid free and segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189840">SUSE bug 1189840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192495">SUSE bug 1192495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    OpenSC before 0.20.0 has a double free in coolkey_free_private_data because coolkey_add_object in libopensc/card-coolkey.c lacks a uniqueness check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792</cve>
	<bugzilla href="https://bugzilla.suse.com/1170809">SUSE bug 1170809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838</cve>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189526">SUSE bug 1189526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193384">SUSE bug 1193384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653930" comment="libpcre1-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653931" comment="libpcre1-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653932" comment="libpcre16-0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653933" comment="libpcre16-0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653934" comment="libpcrecpp0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653935" comment="libpcrecpp0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653936" comment="libpcreposix0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653937" comment="libpcreposix0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653938" comment="pcre-devel-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653939" comment="pcre-devel-static-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653940" comment="pcre-doc-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653941" comment="pcre-tools-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610517" comment="libpython2_7-1_0-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610518" comment="libpython2_7-1_0-32bit-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610519" comment="python-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610520" comment="python-32bit-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610521" comment="python-base-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610522" comment="python-base-32bit-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610523" comment="python-curses-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610524" comment="python-demo-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610525" comment="python-devel-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610526" comment="python-doc-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610527" comment="python-doc-pdf-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610528" comment="python-gdbm-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610529" comment="python-idle-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610530" comment="python-tk-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610531" comment="python-xml-2.7.17-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20916</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG3I7MSGZF7WN3YNM7ML4QMO6MXYUU73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KXU352TPOYPGUNSKDJRXFXWPD5NF32K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DKY5FFZVXAPBL5ATB6LJG4VYEF3GOLN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3AA6BSUJEGBBKUCQO6J25OSG7PA6ZKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOMPFK5R4IK4IFOQTL5NIJK6DKSYRSXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2GBJR7SZL3UIJETOGQDYOPIODBESJYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/623Y5GJHFGANTQ36ECKXIXY3QVKGYSCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUMJS3WWV7Y2IVJFRMZNDUXZBSPWORBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613120" comment="libpython2_7-1_0-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613121" comment="libpython2_7-1_0-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613264" comment="libpython3_6m1_0-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613265" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613122" comment="python-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613123" comment="python-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613124" comment="python-base-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613125" comment="python-base-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613126" comment="python-curses-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613127" comment="python-demo-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613128" comment="python-devel-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613129" comment="python-doc-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613130" comment="python-doc-pdf-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613131" comment="python-gdbm-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613132" comment="python-idle-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613133" comment="python-tk-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613134" comment="python-xml-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612384" comment="python2-pip-10.0.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294865" comment="python2-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612385" comment="python2-pip-wheel-10.0.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337921" comment="python2-pip-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612331" comment="python2-setuptools-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303045" comment="python2-setuptools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612332" comment="python2-setuptools-test-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303046" comment="python2-setuptools-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612333" comment="python2-setuptools-wheel-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303047" comment="python2-setuptools-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613266" comment="python3-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613267" comment="python3-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613268" comment="python3-base-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613269" comment="python3-base-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613270" comment="python3-curses-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613271" comment="python3-dbm-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613272" comment="python3-devel-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613273" comment="python3-doc-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613274" comment="python3-doc-devhelp-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613275" comment="python3-idle-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612386" comment="python3-pip-10.0.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612387" comment="python3-pip-wheel-10.0.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337922" comment="python3-pip-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612334" comment="python3-setuptools-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612335" comment="python3-setuptools-test-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303049" comment="python3-setuptools-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612336" comment="python3-setuptools-wheel-40.5.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303050" comment="python3-setuptools-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613276" comment="python3-testsuite-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613277" comment="python3-tk-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613278" comment="python3-tools-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20919</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611447" comment="perl-DBI-1.642-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013</cve>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613426" comment="glibc-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613427" comment="glibc-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613428" comment="glibc-devel-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613429" comment="glibc-devel-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613430" comment="glibc-devel-static-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613431" comment="glibc-devel-static-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613432" comment="glibc-extra-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613433" comment="glibc-html-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613434" comment="glibc-i18ndata-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613435" comment="glibc-info-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613436" comment="glibc-locale-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613437" comment="glibc-locale-base-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613438" comment="glibc-locale-base-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613439" comment="glibc-profile-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613440" comment="glibc-profile-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613441" comment="glibc-utils-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613442" comment="glibc-utils-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613443" comment="nscd-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25051</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFDL4ZU73CCA7DXOG7N2VKN4DXLIO7WL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2794-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52SJCPNULPFJAYMPRPDX7QYNTBFA4SXP/" source="SUSE-SU"/>
    <description>
    objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189485">SUSE bug 1189485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192363">SUSE bug 1192363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193390">SUSE bug 1193390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631585" comment="aspell-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631516" comment="aspell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631586" comment="aspell-devel-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631517" comment="aspell-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631587" comment="aspell-ispell-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631518" comment="aspell-ispell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631588" comment="aspell-spell-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631519" comment="aspell-spell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631589" comment="libaspell15-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631520" comment="libaspell15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631590" comment="libaspell15-32bit-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631521" comment="libaspell15-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631591" comment="libpspell15-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631522" comment="libpspell15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631592" comment="libpspell15-32bit-0.60.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631523" comment="libpspell15-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3500" ref_url="https://www.suse.com/security/cve/CVE-2019-3500" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3RWOJOX6LLCQBYIEUS2KKAEEPLXW6WP/" source="SUSE-SU"/>
    <description>
    aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3500/">CVE-2019-3500</cve>
	<bugzilla href="https://bugzilla.suse.com/1120488">SUSE bug 1120488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630547" comment="aria2-1.35.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151348" comment="aria2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630548" comment="aria2-devel-1.35.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243009" comment="aria2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630549" comment="aria2-lang-1.35.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151349" comment="aria2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630550" comment="libaria2-0-1.35.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154087" comment="libaria2-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612244" comment="libssh2-1-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612245" comment="libssh2-1-32bit-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612246" comment="libssh2-devel-1.9.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3881" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3881" ref_url="https://www.suse.com/security/cve/CVE-2019-3881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00051.html" source="SUSE-SU"/>
    <description>
    Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3881/">CVE-2019-3881</cve>
	<bugzilla href="https://bugzilla.suse.com/1143436">SUSE bug 1143436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612647" comment="ruby2.5-rubygem-bundler-1.16.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285430" comment="ruby2.5-rubygem-bundler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612648" comment="ruby2.5-rubygem-bundler-doc-1.16.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285431" comment="ruby2.5-rubygem-bundler-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3902" ref_url="https://www.suse.com/security/cve/CVE-2019-3902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1709-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00057.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3902/">CVE-2019-3902</cve>
	<bugzilla href="https://bugzilla.suse.com/1133035">SUSE bug 1133035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612674" comment="mercurial-4.5.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612675" comment="mercurial-lang-4.5.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<bugzilla href="https://bugzilla.suse.com/1129272">SUSE bug 1129272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a possible denial of service vulnerability in Action View (Rails) &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1129271">SUSE bug 1129271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt;6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420</cve>
	<bugzilla href="https://bugzilla.suse.com/1129268">SUSE bug 1129268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008258.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLEJCRYIVSTKE34ZJIXITKLZOOKOAMWQ/" source="SUSE-SU"/>
    <description>
    A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613010" comment="ruby2.5-rubygem-nokogiri-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342874" comment="ruby2.5-rubygem-nokogiri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613011" comment="ruby2.5-rubygem-nokogiri-doc-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342875" comment="ruby2.5-rubygem-nokogiri-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613012" comment="ruby2.5-rubygem-nokogiri-testsuite-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342876" comment="ruby2.5-rubygem-nokogiri-testsuite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197136">SUSE bug 1197136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7314" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7314" ref_url="https://www.suse.com/security/cve/CVE-2019-7314" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html" source="SUSE-SU"/>
    <description>
    liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-7314/">CVE-2019-7314</cve>
	<bugzilla href="https://bugzilla.suse.com/1124159">SUSE bug 1124159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612756" comment="libBasicUsageEnvironment1-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612757" comment="libUsageEnvironment3-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612758" comment="libgroupsock8-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260578" comment="libgroupsock8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612759" comment="libliveMedia66-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260580" comment="libliveMedia66 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612760" comment="live555-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612761" comment="live555-devel-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8075" ref_url="https://www.suse.com/security/cve/CVE-2019-8075" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-8075/">CVE-2019-8075</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8842</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYJFJX2GGKH4VAMYMTSR5TZZO2F2HPHC/" source="SUSE-SU"/>
    <description>
    A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842</cve>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613079" comment="cups-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613080" comment="cups-client-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613081" comment="cups-config-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613082" comment="cups-ddk-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613083" comment="cups-devel-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613084" comment="cups-devel-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613085" comment="libcups2-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613086" comment="libcups2-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613087" comment="libcupscgi1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613088" comment="libcupscgi1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613089" comment="libcupsimage2-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613090" comment="libcupsimage2-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613091" comment="libcupsmime1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613092" comment="libcupsmime1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613093" comment="libcupsppdc1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613094" comment="libcupsppdc1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1071544">SUSE bug 1071544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193110">SUSE bug 1193110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611818" comment="binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611819" comment="binutils-devel-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611820" comment="binutils-devel-32bit-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611821" comment="binutils-gold-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611822" comment="cross-aarch64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611823" comment="cross-arm-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611824" comment="cross-avr-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611825" comment="cross-epiphany-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611826" comment="cross-hppa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611827" comment="cross-hppa64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611828" comment="cross-i386-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611829" comment="cross-ia64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611830" comment="cross-m68k-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611831" comment="cross-mips-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611832" comment="cross-ppc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611833" comment="cross-ppc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611834" comment="cross-ppc64le-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611835" comment="cross-riscv64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611836" comment="cross-rx-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611837" comment="cross-s390-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611838" comment="cross-s390x-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611839" comment="cross-sparc-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611840" comment="cross-sparc64-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611841" comment="cross-spu-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611842" comment="cross-xtensa-binutils-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611843" comment="libctf-nobfd0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611844" comment="libctf0-2.35-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9215" ref_url="https://www.suse.com/security/cve/CVE-2019-9215" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html" source="SUSE-SU"/>
    <description>
    In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9215/">CVE-2019-9215</cve>
	<bugzilla href="https://bugzilla.suse.com/1127341">SUSE bug 1127341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612756" comment="libBasicUsageEnvironment1-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612757" comment="libUsageEnvironment3-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612758" comment="libgroupsock8-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260578" comment="libgroupsock8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612759" comment="libliveMedia66-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260580" comment="libliveMedia66 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612760" comment="live555-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612761" comment="live555-devel-2019.06.28-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9494</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9495</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9495" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9497" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612155" comment="wpa_supplicant-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612156" comment="wpa_supplicant-gui-2.9-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614774" comment="libu2f-host-devel-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614775" comment="libu2f-host-doc-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614776" comment="libu2f-host0-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614777" comment="u2f-host-1.1.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9752" ref_url="https://www.suse.com/security/cve/CVE-2019-9752" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9752/">CVE-2019-9752</cve>
	<bugzilla href="https://bugzilla.suse.com/1122560">SUSE bug 1122560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129756">SUSE bug 1129756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1130165">SUSE bug 1130165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9892</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9892" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9892" ref_url="https://www.suse.com/security/cve/CVE-2019-9892" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files on the OTRS filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9892/">CVE-2019-9892</cve>
	<bugzilla href="https://bugzilla.suse.com/1133755">SUSE bug 1133755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139406">SUSE bug 1139406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0110</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0110" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<bugzilla href="https://bugzilla.suse.com/1171374">SUSE bug 1171374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174874">SUSE bug 1174874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0404</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0427</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0431</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0487</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0487" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<bugzilla href="https://bugzilla.suse.com/1180112">SUSE bug 1180112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612612" comment="flac-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612613" comment="flac-devel-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612614" comment="flac-devel-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175207" comment="flac-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612615" comment="flac-doc-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175208" comment="flac-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612616" comment="libFLAC++6-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612617" comment="libFLAC++6-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175209" comment="libFLAC++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612618" comment="libFLAC8-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612619" comment="libFLAC8-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    In FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612612" comment="flac-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612613" comment="flac-devel-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612614" comment="flac-devel-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175207" comment="flac-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612615" comment="flac-doc-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175208" comment="flac-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612616" comment="libFLAC++6-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612617" comment="libFLAC++6-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175209" comment="libFLAC++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612618" comment="libFLAC8-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612619" comment="libFLAC8-32bit-1.3.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID000019643" ref_url="https://www.suse.com/support/kb/doc/?id=000019643" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172206">SUSE bug 1172206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172207">SUSE bug 1172207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172770">SUSE bug 1172770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612819" comment="xen-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612820" comment="xen-devel-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612821" comment="xen-doc-html-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612822" comment="xen-libs-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612823" comment="xen-libs-32bit-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612824" comment="xen-tools-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612825" comment="xen-tools-domU-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612826" comment="xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html" source="SUSE-SU"/>
    <description>
    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612649" comment="bluez-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612650" comment="bluez-auto-enable-devices-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612651" comment="bluez-cups-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612652" comment="bluez-devel-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612653" comment="bluez-devel-32bit-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612654" comment="bluez-test-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612655" comment="libbluetooth3-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612656" comment="libbluetooth3-32bit-5.48-lp152.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10001</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYJFJX2GGKH4VAMYMTSR5TZZO2F2HPHC/" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613079" comment="cups-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613080" comment="cups-client-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613081" comment="cups-config-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613082" comment="cups-ddk-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613083" comment="cups-devel-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613084" comment="cups-devel-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613085" comment="libcups2-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613086" comment="libcups2-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613087" comment="libcupscgi1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613088" comment="libcupscgi1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613089" comment="libcupsimage2-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613090" comment="libcupsimage2-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613091" comment="libcupsmime1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613092" comment="libcupsmime1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613093" comment="libcupsppdc1-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613094" comment="libcupsppdc1-32bit-2.2.7-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10592" ref_url="https://www.suse.com/security/cve/CVE-2020-10592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10592/">CVE-2020-10592</cve>
	<bugzilla href="https://bugzilla.suse.com/1167013">SUSE bug 1167013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615257" comment="tor-0.4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10593" ref_url="https://www.suse.com/security/cve/CVE-2020-10593" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10593/">CVE-2020-10593</cve>
	<bugzilla href="https://bugzilla.suse.com/1167014">SUSE bug 1167014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615257" comment="tor-0.4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648</cve>
	<bugzilla href="https://bugzilla.suse.com/1167209">SUSE bug 1167209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611948" comment="u-boot-tools-2020.01-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613247" comment="buildah-1.19.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613248" comment="libcontainers-common-20210112-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613249" comment="podman-2.2.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613250" comment="podman-cni-config-2.2.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<bugzilla href="https://bugzilla.suse.com/1169850">SUSE bug 1169850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<bugzilla href="https://bugzilla.suse.com/1169851">SUSE bug 1169851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173456">SUSE bug 1173456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199353">SUSE bug 1199353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749</cve>
	<bugzilla href="https://bugzilla.suse.com/1172375">SUSE bug 1172375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172410">SUSE bug 1172410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610125" comment="cni-plugins-0.8.6-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280794" comment="cni-plugins is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174963">SUSE bug 1174963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612827" comment="slirp4netns-0.4.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR4WC2OGLKRFBB7HJ3YCZ6PTJUJK67B4/" source="SUSE-SU"/>
    <description>
    A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759</cve>
	<bugzilla href="https://bugzilla.suse.com/1172643">SUSE bug 1172643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613996" comment="dfu-tool-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286264" comment="dfu-tool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613997" comment="fwupd-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286265" comment="fwupd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613998" comment="fwupd-devel-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286266" comment="fwupd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613999" comment="fwupd-lang-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286267" comment="fwupd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614000" comment="libfwupd2-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286268" comment="libfwupd2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614001" comment="typelib-1_0-Fwupd-2_0-1.2.14-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286269" comment="typelib-1_0-Fwupd-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<bugzilla href="https://bugzilla.suse.com/1173161">SUSE bug 1173161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610165" comment="qemu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610166" comment="qemu-arm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610167" comment="qemu-audio-alsa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610168" comment="qemu-audio-pa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610169" comment="qemu-audio-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610170" comment="qemu-block-curl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610171" comment="qemu-block-dmg-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610172" comment="qemu-block-gluster-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610173" comment="qemu-block-iscsi-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610174" comment="qemu-block-nfs-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610175" comment="qemu-block-rbd-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610176" comment="qemu-block-ssh-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610177" comment="qemu-extra-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610178" comment="qemu-guest-agent-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610179" comment="qemu-ipxe-1.0.0+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610180" comment="qemu-ksm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610181" comment="qemu-kvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610182" comment="qemu-lang-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610183" comment="qemu-linux-user-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610184" comment="qemu-microvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610185" comment="qemu-ppc-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610186" comment="qemu-s390-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610187" comment="qemu-seabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610188" comment="qemu-sgabios-8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610189" comment="qemu-testsuite-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610190" comment="qemu-tools-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610191" comment="qemu-ui-curses-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610192" comment="qemu-ui-gtk-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610193" comment="qemu-ui-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610194" comment="qemu-ui-spice-app-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610195" comment="qemu-vgabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610196" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610197" comment="qemu-x86-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A stack information leak flaw was found in s390/s390x in the Linux kernel’s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10932</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10932" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10932" ref_url="https://www.suse.com/security/cve/CVE-2020-10932" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXL26ADEMUDQB634BGFJBSDD6LVNPAKC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24S6SRIXKQUW53S4LWIAJUR5ZBOCJPEA/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10932/">CVE-2020-10932</cve>
	<bugzilla href="https://bugzilla.suse.com/1181468">SUSE bug 1181468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613573" comment="libmbedcrypto3-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346906" comment="libmbedcrypto3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613574" comment="libmbedcrypto3-32bit-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346907" comment="libmbedcrypto3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613575" comment="libmbedtls12-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346908" comment="libmbedtls12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613576" comment="libmbedtls12-32bit-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346909" comment="libmbedtls12-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613577" comment="libmbedx509-0-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346910" comment="libmbedx509-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613578" comment="libmbedx509-0-32bit-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346911" comment="libmbedx509-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613579" comment="mbedtls-devel-2.16.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152976" comment="mbedtls-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190663">SUSE bug 1190663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615258" comment="cacti-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615259" comment="cacti-spine-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615260" comment="otrs-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615261" comment="otrs-doc-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615262" comment="otrs-itsm-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing &lt;option&gt; elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190660">SUSE bug 1190660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615258" comment="cacti-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615259" comment="cacti-spine-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615260" comment="otrs-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615261" comment="otrs-doc-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615262" comment="otrs-itsm-6.0.30-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11076</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11076" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609983" comment="ruby2.5-rubygem-puma-4.3.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287506" comment="ruby2.5-rubygem-puma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609984" comment="ruby2.5-rubygem-puma-doc-4.3.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287507" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11077" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609983" comment="ruby2.5-rubygem-puma-4.3.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287506" comment="ruby2.5-rubygem-puma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609984" comment="ruby2.5-rubygem-puma-doc-4.3.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287507" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANZIEBB4AJVGYC2KYDE7RDSTFBBTL5ID/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
    <description>
    In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614743" comment="python2-httplib2-0.19.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475569" comment="python2-httplib2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614744" comment="python3-httplib2-0.19.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475570" comment="python3-httplib2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11080</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FQEUDKQEBT4RUZ2JLDQBWSAYUJ4SCTW/" source="SUSE-SU"/>
    <description>
    In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<bugzilla href="https://bugzilla.suse.com/1172441">SUSE bug 1172441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613822" comment="libnghttp2-14-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613823" comment="libnghttp2-14-32bit-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177223" comment="libnghttp2-14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613824" comment="libnghttp2-devel-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613825" comment="libnghttp2_asio-devel-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613826" comment="libnghttp2_asio1-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613827" comment="libnghttp2_asio1-32bit-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267106" comment="libnghttp2_asio1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613828" comment="nghttp2-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613829" comment="python3-nghttp2-1.40.0-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267108" comment="python3-nghttp2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647</cve>
	<bugzilla href="https://bugzilla.suse.com/1169063">SUSE bug 1169063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610346" comment="libwireshark13-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610347" comment="libwiretap10-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610348" comment="libwsutil11-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610349" comment="wireshark-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610350" comment="wireshark-devel-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610351" comment="wireshark-ui-qt-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11668</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11800" ref_url="https://www.suse.com/security/cve/CVE-2020-11800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html" source="SUSE-SU"/>
    <description>
    Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11800/">CVE-2020-11800</cve>
	<bugzilla href="https://bugzilla.suse.com/1177467">SUSE bug 1177467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615263" comment="zabbix-agent-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294885" comment="zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615264" comment="zabbix-bash-completion-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294887" comment="zabbix-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615265" comment="zabbix-java-gateway-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294889" comment="zabbix-java-gateway is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615266" comment="zabbix-phpfrontend-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294891" comment="zabbix-phpfrontend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615267" comment="zabbix-proxy-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294893" comment="zabbix-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615268" comment="zabbix-proxy-mysql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294895" comment="zabbix-proxy-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615269" comment="zabbix-proxy-postgresql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294897" comment="zabbix-proxy-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615270" comment="zabbix-proxy-sqlite-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294899" comment="zabbix-proxy-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615271" comment="zabbix-server-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294901" comment="zabbix-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615272" comment="zabbix-server-mysql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294903" comment="zabbix-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615273" comment="zabbix-server-postgresql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294905" comment="zabbix-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615274" comment="zabbix-server-sqlite-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294907" comment="zabbix-server-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810</cve>
	<bugzilla href="https://bugzilla.suse.com/1169925">SUSE bug 1169925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614668" comment="openvpn-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152221" comment="openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614669" comment="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157252" comment="openvpn-auth-pam-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614670" comment="openvpn-devel-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157253" comment="openvpn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614671" comment="openvpn-down-root-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157254" comment="openvpn-down-root-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11867" ref_url="https://www.suse.com/security/cve/CVE-2020-11867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIO5YFJW5KODA2NDQAAMKAOM57Z2ZM4W/" source="SUSE-SU"/>
    <description>
    Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11867/">CVE-2020-11867</cve>
	<bugzilla href="https://bugzilla.suse.com/1179449">SUSE bug 1179449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615275" comment="audacity-2.2.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338701" comment="audacity is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615276" comment="audacity-lang-2.2.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338703" comment="audacity-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11868</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609986" comment="ntp-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609987" comment="ntp-doc-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11947</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613444" comment="qemu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613445" comment="qemu-arm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613446" comment="qemu-audio-alsa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613447" comment="qemu-audio-pa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613448" comment="qemu-audio-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613449" comment="qemu-block-curl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613450" comment="qemu-block-dmg-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613451" comment="qemu-block-gluster-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613452" comment="qemu-block-iscsi-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613453" comment="qemu-block-nfs-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613454" comment="qemu-block-rbd-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613455" comment="qemu-block-ssh-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613456" comment="qemu-extra-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613457" comment="qemu-guest-agent-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613458" comment="qemu-ipxe-1.0.0+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613459" comment="qemu-ksm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613460" comment="qemu-kvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613461" comment="qemu-lang-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613462" comment="qemu-linux-user-4.2.1-lp152.9.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613463" comment="qemu-microvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613464" comment="qemu-ppc-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613465" comment="qemu-s390-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613466" comment="qemu-seabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613467" comment="qemu-sgabios-8-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613468" comment="qemu-testsuite-4.2.1-lp152.9.9.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613469" comment="qemu-tools-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613470" comment="qemu-ui-curses-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613471" comment="qemu-ui-gtk-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613472" comment="qemu-ui-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613473" comment="qemu-ui-spice-app-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613474" comment="qemu-vgabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613475" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613476" comment="qemu-x86-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
    <description>
    Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984</cve>
	<bugzilla href="https://bugzilla.suse.com/1175074">SUSE bug 1175074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610736" comment="apache2-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610737" comment="apache2-devel-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610738" comment="apache2-doc-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610739" comment="apache2-event-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610740" comment="apache2-example-pages-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610741" comment="apache2-prefork-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610742" comment="apache2-utils-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610743" comment="apache2-worker-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11993</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610736" comment="apache2-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610737" comment="apache2-devel-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610738" comment="apache2-doc-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610739" comment="apache2-event-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610740" comment="apache2-example-pages-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610741" comment="apache2-prefork-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610742" comment="apache2-utils-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610743" comment="apache2-worker-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11996</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11996" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007165.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html" source="SUSE-SU"/>
    <description>
    A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996</cve>
	<bugzilla href="https://bugzilla.suse.com/1173389">SUSE bug 1173389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610148" comment="tomcat-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610149" comment="tomcat-admin-webapps-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610150" comment="tomcat-docs-webapp-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610151" comment="tomcat-el-3_0-api-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610152" comment="tomcat-embed-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610153" comment="tomcat-javadoc-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610154" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610155" comment="tomcat-jsvc-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610156" comment="tomcat-lib-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610157" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610158" comment="tomcat-webapps-9.0.36-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPUICUYAOLJREPLAWO5JOKCXD4HSH4KT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILND7MBTQAFIRZBI5CMERWHRUVEAKAOD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in dbus &gt;= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049</cve>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631955" comment="dbus-1-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631956" comment="dbus-1-devel-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631957" comment="dbus-1-devel-32bit-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258222" comment="dbus-1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631958" comment="dbus-1-devel-doc-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258223" comment="dbus-1-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631959" comment="dbus-1-x11-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631960" comment="libdbus-1-3-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631961" comment="libdbus-1-3-32bit-1.12.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12100</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12100" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613097" comment="dovecot23-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613098" comment="dovecot23-backend-mysql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613099" comment="dovecot23-backend-pgsql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613100" comment="dovecot23-backend-sqlite-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613101" comment="dovecot23-devel-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613102" comment="dovecot23-fts-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613103" comment="dovecot23-fts-lucene-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613104" comment="dovecot23-fts-solr-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613105" comment="dovecot23-fts-squat-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12108" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611666" comment="mailman-2.1.34-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611666" comment="mailman-2.1.34-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12245</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12245" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Grafana before 6.7.3 allows table-panel XSS via column.title or cellLinkTooltip.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245</cve>
	<bugzilla href="https://bugzilla.suse.com/1170557">SUSE bug 1170557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610164" comment="dracut-saltboot-0.1.1590413773.a959db7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612684" comment="grafana-7.0.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612685" comment="grafana-piechart-panel-1.4.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291398" comment="grafana-piechart-panel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612686" comment="grafana-status-panel-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291399" comment="grafana-status-panel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12321</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZ3NYJWZSI2ISRG5U4RX3XMDBRHDRTX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWOUPKVHO4A2R27BZDEYM2EMS4RXKDM4/" source="SUSE-SU"/>
    <description>
    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612053" comment="kernel-firmware-20200107-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612054" comment="ucode-amd-20200107-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12352</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182033">SUSE bug 1182033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613673" comment="kernel-firmware-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613674" comment="ucode-amd-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12363</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613673" comment="kernel-firmware-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613674" comment="ucode-amd-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12364</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613673" comment="kernel-firmware-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613674" comment="ucode-amd-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12373</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613673" comment="kernel-firmware-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613674" comment="ucode-amd-20200107-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12400</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633723" comment="libfreebl3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633724" comment="libfreebl3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633725" comment="libfreebl3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633726" comment="libfreebl3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633727" comment="libsoftokn3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633728" comment="libsoftokn3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633729" comment="libsoftokn3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633730" comment="libsoftokn3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633731" comment="mozilla-nspr-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633732" comment="mozilla-nspr-32bit-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633733" comment="mozilla-nspr-devel-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633734" comment="mozilla-nss-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633735" comment="mozilla-nss-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633736" comment="mozilla-nss-certs-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633737" comment="mozilla-nss-certs-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633738" comment="mozilla-nss-devel-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633739" comment="mozilla-nss-sysinit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633740" comment="mozilla-nss-sysinit-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633741" comment="mozilla-nss-tools-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633723" comment="libfreebl3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633724" comment="libfreebl3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633725" comment="libfreebl3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633726" comment="libfreebl3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633727" comment="libsoftokn3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633728" comment="libsoftokn3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633729" comment="libsoftokn3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633730" comment="libsoftokn3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633731" comment="mozilla-nspr-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633732" comment="mozilla-nspr-32bit-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633733" comment="mozilla-nspr-devel-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633734" comment="mozilla-nss-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633735" comment="mozilla-nss-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633736" comment="mozilla-nss-certs-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633737" comment="mozilla-nss-certs-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633738" comment="mozilla-nss-devel-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633739" comment="mozilla-nss-sysinit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633740" comment="mozilla-nss-sysinit-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633741" comment="mozilla-nss-tools-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612776" comment="libfreebl3-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612777" comment="libfreebl3-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612778" comment="libfreebl3-hmac-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612779" comment="libfreebl3-hmac-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612780" comment="libsoftokn3-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612781" comment="libsoftokn3-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612782" comment="libsoftokn3-hmac-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612783" comment="libsoftokn3-hmac-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612784" comment="mozilla-nss-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612785" comment="mozilla-nss-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612786" comment="mozilla-nss-certs-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612787" comment="mozilla-nss-certs-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612788" comment="mozilla-nss-devel-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612789" comment="mozilla-nss-sysinit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612790" comment="mozilla-nss-sysinit-32bit-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612791" comment="mozilla-nss-tools-3.53.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12403</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633723" comment="libfreebl3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633724" comment="libfreebl3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633725" comment="libfreebl3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633726" comment="libfreebl3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633727" comment="libsoftokn3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633728" comment="libsoftokn3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633729" comment="libsoftokn3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633730" comment="libsoftokn3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633731" comment="mozilla-nspr-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633732" comment="mozilla-nspr-32bit-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633733" comment="mozilla-nspr-devel-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633734" comment="mozilla-nss-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633735" comment="mozilla-nss-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633736" comment="mozilla-nss-certs-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633737" comment="mozilla-nss-certs-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633738" comment="mozilla-nss-devel-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633739" comment="mozilla-nss-sysinit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633740" comment="mozilla-nss-sysinit-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633741" comment="mozilla-nss-tools-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12415</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When "%2F" was present in a manifest URL, Firefox's AppCache behavior may have become confused and allowed a manifest to be served from a subdirectory. This could cause the appcache to be used to service requests for the top level directory. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12417</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612810" comment="MozillaThunderbird-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612811" comment="MozillaThunderbird-translations-common-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612812" comment="MozillaThunderbird-translations-other-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612810" comment="MozillaThunderbird-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612811" comment="MozillaThunderbird-translations-common-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612812" comment="MozillaThunderbird-translations-other-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612810" comment="MozillaThunderbird-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612811" comment="MozillaThunderbird-translations-common-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612812" comment="MozillaThunderbird-translations-other-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612810" comment="MozillaThunderbird-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612811" comment="MozillaThunderbird-translations-common-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612812" comment="MozillaThunderbird-translations-other-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612810" comment="MozillaThunderbird-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612811" comment="MozillaThunderbird-translations-common-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612812" comment="MozillaThunderbird-translations-other-68.10.0-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12423</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12424</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12425</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12426</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12426" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612813" comment="MozillaFirefox-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612814" comment="MozillaFirefox-branding-upstream-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612815" comment="MozillaFirefox-buildsymbols-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612816" comment="MozillaFirefox-devel-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612817" comment="MozillaFirefox-translations-common-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612818" comment="MozillaFirefox-translations-other-78.0.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12625" ref_url="https://www.suse.com/security/cve/CVE-2020-12625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12625/">CVE-2020-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1171040">SUSE bug 1171040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12640" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12640" ref_url="https://www.suse.com/security/cve/CVE-2020-12640" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12640/">CVE-2020-12640</cve>
	<bugzilla href="https://bugzilla.suse.com/1171149">SUSE bug 1171149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12641" ref_url="https://www.suse.com/security/cve/CVE-2020-12641" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12641/">CVE-2020-12641</cve>
	<bugzilla href="https://bugzilla.suse.com/1171148">SUSE bug 1171148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12658</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12658" ref_url="https://www.suse.com/security/cve/CVE-2020-12658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008587.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6NDFFQCNMQW6SZXPZI34VPX7QS37NS5/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c. NOTE: An upstream comment states "We are already on a shutdown path when running the code in question, so a DoS there doesn't make any sense, and there has been no additional information provided us (as upstream) to indicate why this would be a problem."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12658/">CVE-2020-12658</cve>
	<bugzilla href="https://bugzilla.suse.com/1180515">SUSE bug 1180515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614002" comment="gssproxy-0.8.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350895" comment="gssproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12662</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612706" comment="libunbound-devel-mini-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612707" comment="libunbound2-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612708" comment="unbound-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612709" comment="unbound-anchor-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612710" comment="unbound-devel-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612711" comment="unbound-munin-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612712" comment="unbound-python-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612706" comment="libunbound-devel-mini-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612707" comment="libunbound2-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612708" comment="unbound-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612709" comment="unbound-anchor-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612710" comment="unbound-devel-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612711" comment="unbound-munin-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612712" comment="unbound-python-1.6.8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610675" comment="dovecot23-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610676" comment="dovecot23-backend-mysql-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610677" comment="dovecot23-backend-pgsql-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610678" comment="dovecot23-backend-sqlite-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610679" comment="dovecot23-devel-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610680" comment="dovecot23-fts-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610681" comment="dovecot23-fts-lucene-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610682" comment="dovecot23-fts-solr-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610683" comment="dovecot23-fts-squat-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610675" comment="dovecot23-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610676" comment="dovecot23-backend-mysql-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610677" comment="dovecot23-backend-pgsql-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610678" comment="dovecot23-backend-sqlite-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610679" comment="dovecot23-devel-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610680" comment="dovecot23-fts-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610681" comment="dovecot23-fts-lucene-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610682" comment="dovecot23-fts-solr-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610683" comment="dovecot23-fts-squat-2.3.10-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12693" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12693" ref_url="https://www.suse.com/security/cve/CVE-2020-12693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1468-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00179.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUZCI5YDK7I74E6E3IP5YWR5GMSO4LPV/" source="SUSE-SU"/>
    <description>
    Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12693/">CVE-2020-12693</cve>
	<bugzilla href="https://bugzilla.suse.com/1172004">SUSE bug 1172004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173804">SUSE bug 1173804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611128" comment="libpmi0-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611129" comment="libslurm33-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611130" comment="perl-slurm-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611131" comment="slurm-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611132" comment="slurm-auth-none-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611133" comment="slurm-config-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611134" comment="slurm-config-man-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611135" comment="slurm-cray-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611136" comment="slurm-devel-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611137" comment="slurm-doc-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611138" comment="slurm-hdf5-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611139" comment="slurm-lua-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611140" comment="slurm-munge-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611141" comment="slurm-node-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611142" comment="slurm-openlava-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611143" comment="slurm-pam_slurm-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611144" comment="slurm-plugins-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611145" comment="slurm-seff-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611146" comment="slurm-sjstat-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611147" comment="slurm-slurmdbd-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611148" comment="slurm-sql-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611149" comment="slurm-sview-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611150" comment="slurm-torque-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611151" comment="slurm-webdoc-18.08.9-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2GHF3UJM6D2JSKELXMJY57IRWK3PJM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSSIKL5YFHBGYOJ3SQBDZNPPVD4OU4WF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZKSW2K4W6JRPVMJ5SOHHDWS6UI5LAZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S45AUDAZDSITTGVELYZ3FY6T7HMLOED/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695</cve>
	<bugzilla href="https://bugzilla.suse.com/1172700">SUSE bug 1172700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179447">SUSE bug 1179447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613975" comment="hostapd-2.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612356" comment="minidlna-1.3.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009334739" comment="minidlna is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610129" comment="kernel-debug-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610130" comment="kernel-debug-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610131" comment="kernel-default-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610132" comment="kernel-default-base-5.3.18-lp152.33.1.lp152.8.4.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610133" comment="kernel-default-base-rebuild-5.3.18-lp152.33.1.lp152.8.4.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610134" comment="kernel-default-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610135" comment="kernel-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610136" comment="kernel-docs-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610137" comment="kernel-docs-html-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610138" comment="kernel-kvmsmall-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610139" comment="kernel-kvmsmall-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610140" comment="kernel-macros-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610141" comment="kernel-obs-build-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610142" comment="kernel-obs-qa-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610143" comment="kernel-preempt-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610144" comment="kernel-preempt-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610145" comment="kernel-source-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610146" comment="kernel-source-vanilla-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610147" comment="kernel-syms-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12783</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12783" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12783" ref_url="https://www.suse.com/security/cve/CVE-2020-12783" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12783/">CVE-2020-12783</cve>
	<bugzilla href="https://bugzilla.suse.com/1171490">SUSE bug 1171490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12802" ref_url="https://www.suse.com/security/cve/CVE-2020-12802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12802/">CVE-2020-12802</cve>
	<bugzilla href="https://bugzilla.suse.com/1172796">SUSE bug 1172796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610532" comment="libreoffice-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610533" comment="libreoffice-base-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610534" comment="libreoffice-base-drivers-firebird-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610535" comment="libreoffice-base-drivers-postgresql-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610536" comment="libreoffice-branding-upstream-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610537" comment="libreoffice-calc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610538" comment="libreoffice-calc-extensions-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610539" comment="libreoffice-draw-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610540" comment="libreoffice-filters-optional-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610541" comment="libreoffice-gdb-pretty-printers-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610542" comment="libreoffice-glade-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610543" comment="libreoffice-gnome-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610544" comment="libreoffice-gtk3-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610545" comment="libreoffice-icon-themes-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610546" comment="libreoffice-impress-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610547" comment="libreoffice-l10n-af-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610548" comment="libreoffice-l10n-am-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610549" comment="libreoffice-l10n-ar-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610550" comment="libreoffice-l10n-as-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610551" comment="libreoffice-l10n-ast-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610552" comment="libreoffice-l10n-be-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610553" comment="libreoffice-l10n-bg-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610554" comment="libreoffice-l10n-bn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610555" comment="libreoffice-l10n-bn_IN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610556" comment="libreoffice-l10n-bo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610557" comment="libreoffice-l10n-br-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610558" comment="libreoffice-l10n-brx-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610559" comment="libreoffice-l10n-bs-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610560" comment="libreoffice-l10n-ca-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610561" comment="libreoffice-l10n-ca_valencia-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610562" comment="libreoffice-l10n-cs-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610563" comment="libreoffice-l10n-cy-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610564" comment="libreoffice-l10n-da-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610565" comment="libreoffice-l10n-de-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610566" comment="libreoffice-l10n-dgo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610567" comment="libreoffice-l10n-dsb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610568" comment="libreoffice-l10n-dz-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610569" comment="libreoffice-l10n-el-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610570" comment="libreoffice-l10n-en-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610571" comment="libreoffice-l10n-en_GB-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610572" comment="libreoffice-l10n-en_ZA-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610573" comment="libreoffice-l10n-eo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610574" comment="libreoffice-l10n-es-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610575" comment="libreoffice-l10n-et-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610576" comment="libreoffice-l10n-eu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610577" comment="libreoffice-l10n-fa-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610578" comment="libreoffice-l10n-fi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610579" comment="libreoffice-l10n-fr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610580" comment="libreoffice-l10n-fy-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610581" comment="libreoffice-l10n-ga-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610582" comment="libreoffice-l10n-gd-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610583" comment="libreoffice-l10n-gl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610584" comment="libreoffice-l10n-gu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610585" comment="libreoffice-l10n-gug-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610586" comment="libreoffice-l10n-he-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610587" comment="libreoffice-l10n-hi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610588" comment="libreoffice-l10n-hr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610589" comment="libreoffice-l10n-hsb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610590" comment="libreoffice-l10n-hu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610591" comment="libreoffice-l10n-id-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610592" comment="libreoffice-l10n-is-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610593" comment="libreoffice-l10n-it-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610594" comment="libreoffice-l10n-ja-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610595" comment="libreoffice-l10n-ka-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610596" comment="libreoffice-l10n-kab-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610597" comment="libreoffice-l10n-kk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610598" comment="libreoffice-l10n-km-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610599" comment="libreoffice-l10n-kmr_Latn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610600" comment="libreoffice-l10n-kn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610601" comment="libreoffice-l10n-ko-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610602" comment="libreoffice-l10n-kok-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610603" comment="libreoffice-l10n-ks-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610604" comment="libreoffice-l10n-lb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610605" comment="libreoffice-l10n-lo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610606" comment="libreoffice-l10n-lt-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610607" comment="libreoffice-l10n-lv-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610608" comment="libreoffice-l10n-mai-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610609" comment="libreoffice-l10n-mk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610610" comment="libreoffice-l10n-ml-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610611" comment="libreoffice-l10n-mn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610612" comment="libreoffice-l10n-mni-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610613" comment="libreoffice-l10n-mr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610614" comment="libreoffice-l10n-my-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610615" comment="libreoffice-l10n-nb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610616" comment="libreoffice-l10n-ne-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610617" comment="libreoffice-l10n-nl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610618" comment="libreoffice-l10n-nn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610619" comment="libreoffice-l10n-nr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610620" comment="libreoffice-l10n-nso-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610621" comment="libreoffice-l10n-oc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610622" comment="libreoffice-l10n-om-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610623" comment="libreoffice-l10n-or-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610624" comment="libreoffice-l10n-pa-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610625" comment="libreoffice-l10n-pl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610626" comment="libreoffice-l10n-pt_BR-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610627" comment="libreoffice-l10n-pt_PT-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610628" comment="libreoffice-l10n-ro-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610629" comment="libreoffice-l10n-ru-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610630" comment="libreoffice-l10n-rw-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610631" comment="libreoffice-l10n-sa_IN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610632" comment="libreoffice-l10n-sat-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610633" comment="libreoffice-l10n-sd-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610634" comment="libreoffice-l10n-si-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610635" comment="libreoffice-l10n-sid-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610636" comment="libreoffice-l10n-sk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610637" comment="libreoffice-l10n-sl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610638" comment="libreoffice-l10n-sq-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610639" comment="libreoffice-l10n-sr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610640" comment="libreoffice-l10n-ss-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610641" comment="libreoffice-l10n-st-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610642" comment="libreoffice-l10n-sv-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610643" comment="libreoffice-l10n-sw_TZ-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610644" comment="libreoffice-l10n-szl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610645" comment="libreoffice-l10n-ta-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610646" comment="libreoffice-l10n-te-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610647" comment="libreoffice-l10n-tg-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610648" comment="libreoffice-l10n-th-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610649" comment="libreoffice-l10n-tn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610650" comment="libreoffice-l10n-tr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610651" comment="libreoffice-l10n-ts-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610652" comment="libreoffice-l10n-tt-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610653" comment="libreoffice-l10n-ug-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610654" comment="libreoffice-l10n-uk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610655" comment="libreoffice-l10n-uz-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610656" comment="libreoffice-l10n-ve-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610657" comment="libreoffice-l10n-vec-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610658" comment="libreoffice-l10n-vi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610659" comment="libreoffice-l10n-xh-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610660" comment="libreoffice-l10n-zh_CN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610661" comment="libreoffice-l10n-zh_TW-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610662" comment="libreoffice-l10n-zu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610663" comment="libreoffice-librelogo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610664" comment="libreoffice-mailmerge-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610665" comment="libreoffice-math-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610666" comment="libreoffice-officebean-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610667" comment="libreoffice-pyuno-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610668" comment="libreoffice-qt5-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610669" comment="libreoffice-sdk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610670" comment="libreoffice-sdk-doc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610671" comment="libreoffice-writer-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610672" comment="libreoffice-writer-extensions-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610673" comment="libreofficekit-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610674" comment="libreofficekit-devel-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12803" ref_url="https://www.suse.com/security/cve/CVE-2020-12803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" source="SUSE-SU"/>
    <description>
    ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12803/">CVE-2020-12803</cve>
	<bugzilla href="https://bugzilla.suse.com/1172795">SUSE bug 1172795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610532" comment="libreoffice-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610533" comment="libreoffice-base-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610534" comment="libreoffice-base-drivers-firebird-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610535" comment="libreoffice-base-drivers-postgresql-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610536" comment="libreoffice-branding-upstream-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610537" comment="libreoffice-calc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610538" comment="libreoffice-calc-extensions-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610539" comment="libreoffice-draw-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610540" comment="libreoffice-filters-optional-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610541" comment="libreoffice-gdb-pretty-printers-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610542" comment="libreoffice-glade-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610543" comment="libreoffice-gnome-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610544" comment="libreoffice-gtk3-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610545" comment="libreoffice-icon-themes-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610546" comment="libreoffice-impress-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610547" comment="libreoffice-l10n-af-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610548" comment="libreoffice-l10n-am-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610549" comment="libreoffice-l10n-ar-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610550" comment="libreoffice-l10n-as-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610551" comment="libreoffice-l10n-ast-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610552" comment="libreoffice-l10n-be-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610553" comment="libreoffice-l10n-bg-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610554" comment="libreoffice-l10n-bn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610555" comment="libreoffice-l10n-bn_IN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610556" comment="libreoffice-l10n-bo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610557" comment="libreoffice-l10n-br-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610558" comment="libreoffice-l10n-brx-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610559" comment="libreoffice-l10n-bs-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610560" comment="libreoffice-l10n-ca-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610561" comment="libreoffice-l10n-ca_valencia-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610562" comment="libreoffice-l10n-cs-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610563" comment="libreoffice-l10n-cy-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610564" comment="libreoffice-l10n-da-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610565" comment="libreoffice-l10n-de-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610566" comment="libreoffice-l10n-dgo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610567" comment="libreoffice-l10n-dsb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610568" comment="libreoffice-l10n-dz-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610569" comment="libreoffice-l10n-el-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610570" comment="libreoffice-l10n-en-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610571" comment="libreoffice-l10n-en_GB-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610572" comment="libreoffice-l10n-en_ZA-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610573" comment="libreoffice-l10n-eo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610574" comment="libreoffice-l10n-es-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610575" comment="libreoffice-l10n-et-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610576" comment="libreoffice-l10n-eu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610577" comment="libreoffice-l10n-fa-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610578" comment="libreoffice-l10n-fi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610579" comment="libreoffice-l10n-fr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610580" comment="libreoffice-l10n-fy-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610581" comment="libreoffice-l10n-ga-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610582" comment="libreoffice-l10n-gd-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610583" comment="libreoffice-l10n-gl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610584" comment="libreoffice-l10n-gu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610585" comment="libreoffice-l10n-gug-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610586" comment="libreoffice-l10n-he-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610587" comment="libreoffice-l10n-hi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610588" comment="libreoffice-l10n-hr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610589" comment="libreoffice-l10n-hsb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610590" comment="libreoffice-l10n-hu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610591" comment="libreoffice-l10n-id-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610592" comment="libreoffice-l10n-is-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610593" comment="libreoffice-l10n-it-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610594" comment="libreoffice-l10n-ja-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610595" comment="libreoffice-l10n-ka-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610596" comment="libreoffice-l10n-kab-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610597" comment="libreoffice-l10n-kk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610598" comment="libreoffice-l10n-km-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610599" comment="libreoffice-l10n-kmr_Latn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610600" comment="libreoffice-l10n-kn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610601" comment="libreoffice-l10n-ko-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610602" comment="libreoffice-l10n-kok-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610603" comment="libreoffice-l10n-ks-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610604" comment="libreoffice-l10n-lb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610605" comment="libreoffice-l10n-lo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610606" comment="libreoffice-l10n-lt-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610607" comment="libreoffice-l10n-lv-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610608" comment="libreoffice-l10n-mai-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610609" comment="libreoffice-l10n-mk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610610" comment="libreoffice-l10n-ml-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610611" comment="libreoffice-l10n-mn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610612" comment="libreoffice-l10n-mni-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610613" comment="libreoffice-l10n-mr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610614" comment="libreoffice-l10n-my-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610615" comment="libreoffice-l10n-nb-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610616" comment="libreoffice-l10n-ne-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610617" comment="libreoffice-l10n-nl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610618" comment="libreoffice-l10n-nn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610619" comment="libreoffice-l10n-nr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610620" comment="libreoffice-l10n-nso-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610621" comment="libreoffice-l10n-oc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610622" comment="libreoffice-l10n-om-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610623" comment="libreoffice-l10n-or-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610624" comment="libreoffice-l10n-pa-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610625" comment="libreoffice-l10n-pl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610626" comment="libreoffice-l10n-pt_BR-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610627" comment="libreoffice-l10n-pt_PT-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610628" comment="libreoffice-l10n-ro-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610629" comment="libreoffice-l10n-ru-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610630" comment="libreoffice-l10n-rw-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610631" comment="libreoffice-l10n-sa_IN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610632" comment="libreoffice-l10n-sat-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610633" comment="libreoffice-l10n-sd-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610634" comment="libreoffice-l10n-si-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610635" comment="libreoffice-l10n-sid-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610636" comment="libreoffice-l10n-sk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610637" comment="libreoffice-l10n-sl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610638" comment="libreoffice-l10n-sq-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610639" comment="libreoffice-l10n-sr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610640" comment="libreoffice-l10n-ss-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610641" comment="libreoffice-l10n-st-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610642" comment="libreoffice-l10n-sv-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610643" comment="libreoffice-l10n-sw_TZ-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610644" comment="libreoffice-l10n-szl-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610645" comment="libreoffice-l10n-ta-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610646" comment="libreoffice-l10n-te-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610647" comment="libreoffice-l10n-tg-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610648" comment="libreoffice-l10n-th-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610649" comment="libreoffice-l10n-tn-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610650" comment="libreoffice-l10n-tr-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610651" comment="libreoffice-l10n-ts-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610652" comment="libreoffice-l10n-tt-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610653" comment="libreoffice-l10n-ug-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610654" comment="libreoffice-l10n-uk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610655" comment="libreoffice-l10n-uz-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610656" comment="libreoffice-l10n-ve-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610657" comment="libreoffice-l10n-vec-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610658" comment="libreoffice-l10n-vi-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610659" comment="libreoffice-l10n-xh-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610660" comment="libreoffice-l10n-zh_CN-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610661" comment="libreoffice-l10n-zh_TW-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610662" comment="libreoffice-l10n-zu-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610663" comment="libreoffice-librelogo-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610664" comment="libreoffice-mailmerge-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610665" comment="libreoffice-math-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610666" comment="libreoffice-officebean-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610667" comment="libreoffice-pyuno-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610668" comment="libreoffice-qt5-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610669" comment="libreoffice-sdk-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610670" comment="libreoffice-sdk-doc-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610671" comment="libreoffice-writer-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610672" comment="libreoffice-writer-extensions-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610673" comment="libreofficekit-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610674" comment="libreofficekit-devel-6.4.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12823</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12823" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html" source="SUSE-SU"/>
    <description>
    OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823</cve>
	<bugzilla href="https://bugzilla.suse.com/1171862">SUSE bug 1171862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610115" comment="openconnect-7.08-lp152.9.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610116" comment="openconnect-devel-7.08-lp152.9.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610117" comment="openconnect-doc-7.08-lp152.9.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268921" comment="openconnect-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610118" comment="openconnect-lang-7.08-lp152.9.4.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177178" comment="openconnect-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12825</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FYZZYH2MI4PFNRWE2NZ5CTA5TOHKDLPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WG6EJIK3ZOQTMMMAGVUCMM2QCK7CQQ77/" source="SUSE-SU"/>
    <description>
    libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633711" comment="libcroco-0.6.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257312" comment="libcroco is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633712" comment="libcroco-0_6-3-0.6.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177260" comment="libcroco-0_6-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633713" comment="libcroco-0_6-3-32bit-0.6.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177261" comment="libcroco-0_6-3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633714" comment="libcroco-devel-0.6.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257313" comment="libcroco-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12829</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12861" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611792" comment="sane-backends-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611793" comment="sane-backends-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611794" comment="sane-backends-autoconfig-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611795" comment="sane-backends-devel-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611796" comment="sane-backends-devel-32bit-1.0.31-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12888</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179612">SUSE bug 1179612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164</cve>
	<bugzilla href="https://bugzilla.suse.com/1171899">SUSE bug 1171899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610346" comment="libwireshark13-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610347" comment="libwiretap10-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610348" comment="libwsutil11-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610349" comment="wireshark-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610350" comment="wireshark-devel-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610351" comment="wireshark-ui-qt-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610165" comment="qemu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610166" comment="qemu-arm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610167" comment="qemu-audio-alsa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610168" comment="qemu-audio-pa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610169" comment="qemu-audio-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610170" comment="qemu-block-curl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610171" comment="qemu-block-dmg-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610172" comment="qemu-block-gluster-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610173" comment="qemu-block-iscsi-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610174" comment="qemu-block-nfs-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610175" comment="qemu-block-rbd-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610176" comment="qemu-block-ssh-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610177" comment="qemu-extra-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610178" comment="qemu-guest-agent-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610179" comment="qemu-ipxe-1.0.0+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610180" comment="qemu-ksm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610181" comment="qemu-kvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610182" comment="qemu-lang-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610183" comment="qemu-linux-user-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610184" comment="qemu-microvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610185" comment="qemu-ppc-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610186" comment="qemu-s390-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610187" comment="qemu-seabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610188" comment="qemu-sgabios-8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610189" comment="qemu-testsuite-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610190" comment="qemu-tools-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610191" comment="qemu-ui-curses-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610192" comment="qemu-ui-gtk-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610193" comment="qemu-ui-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610194" comment="qemu-ui-spice-app-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610195" comment="qemu-vgabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610196" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610197" comment="qemu-x86-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610165" comment="qemu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610166" comment="qemu-arm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610167" comment="qemu-audio-alsa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610168" comment="qemu-audio-pa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610169" comment="qemu-audio-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610170" comment="qemu-block-curl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610171" comment="qemu-block-dmg-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610172" comment="qemu-block-gluster-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610173" comment="qemu-block-iscsi-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610174" comment="qemu-block-nfs-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610175" comment="qemu-block-rbd-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610176" comment="qemu-block-ssh-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610177" comment="qemu-extra-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610178" comment="qemu-guest-agent-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610179" comment="qemu-ipxe-1.0.0+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610180" comment="qemu-ksm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610181" comment="qemu-kvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610182" comment="qemu-lang-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610183" comment="qemu-linux-user-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610184" comment="qemu-microvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610185" comment="qemu-ppc-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610186" comment="qemu-s390-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610187" comment="qemu-seabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610188" comment="qemu-sgabios-8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610189" comment="qemu-testsuite-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610190" comment="qemu-tools-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610191" comment="qemu-ui-curses-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610192" comment="qemu-ui-gtk-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610193" comment="qemu-ui-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610194" comment="qemu-ui-spice-app-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610195" comment="qemu-vgabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610196" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610197" comment="qemu-x86-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13379</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13379" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379</cve>
	<bugzilla href="https://bugzilla.suse.com/1172409">SUSE bug 1172409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610164" comment="dracut-saltboot-0.1.1590413773.a959db7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612684" comment="grafana-7.0.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612685" comment="grafana-piechart-panel-1.4.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291398" comment="grafana-piechart-panel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612686" comment="grafana-status-panel-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291399" comment="grafana-status-panel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13428" ref_url="https://www.suse.com/security/cve/CVE-2020-13428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD6C4CTIQTZF237437FPGD5AIRV33TET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIZQCEFFNAB3CPF433JKRUT3ZM2EDM33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYGQU4F6PPW4XHK4LTESKSQ2CPHZS3QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJCT5WYFJXXNRF5NSC7LOIHN7BD5UKVV/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the hxxx_AnnexB_to_xVC function in modules/packetizer/hxxx_nal.c in VideoLAN VLC media player before 3.0.11 for macOS/iOS allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted H.264 Annex-B video (.avi for example) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13428/">CVE-2020-13428</cve>
	<bugzilla href="https://bugzilla.suse.com/1172727">SUSE bug 1172727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615172" comment="libvlc5-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615173" comment="libvlccore9-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615174" comment="vlc-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615175" comment="vlc-codec-gstreamer-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615176" comment="vlc-devel-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615177" comment="vlc-jack-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615178" comment="vlc-lang-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615179" comment="vlc-noX-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615180" comment="vlc-opencv-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615181" comment="vlc-qt-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615182" comment="vlc-vdpau-3.0.11.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13429</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13429" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13429" ref_url="https://www.suse.com/security/cve/CVE-2020-13429" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009472.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXHELI44TGNRVVE3N32KXRTYBU3O3F3H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JN7UM2F5HQYAKPOO75CIJNTXDGDU6ZTJ/" source="SUSE-SU"/>
    <description>
    legend.ts in the piechart-panel (aka Pie Chart Panel) plugin before 1.5.0 for Grafana allows XSS via the Values Header (aka legend header) option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13429/">CVE-2020-13429</cve>
	<bugzilla href="https://bugzilla.suse.com/1172125">SUSE bug 1172125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634040" comment="grafana-piechart-panel-1.6.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291398" comment="grafana-piechart-panel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13434</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13435</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612500" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612501" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612502" comment="libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612503" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612504" comment="libwebkit2gtk3-lang-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612505" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612506" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612507" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612508" comment="webkit-jsc-4-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612509" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612510" comment="webkit2gtk3-devel-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612511" comment="webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3MQBA72WHEO5RZKASEJOENULHWKFOZY/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613545" comment="libjavascriptcoregtk-4_0-18-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613546" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613547" comment="libwebkit2gtk-4_0-37-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613548" comment="libwebkit2gtk-4_0-37-32bit-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613549" comment="libwebkit2gtk3-lang-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613550" comment="typelib-1_0-JavaScriptCore-4_0-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613551" comment="typelib-1_0-WebKit2-4_0-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613552" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613553" comment="webkit-jsc-4-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613554" comment="webkit2gtk-4_0-injected-bundles-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613555" comment="webkit2gtk3-devel-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613556" comment="webkit2gtk3-minibrowser-2.30.5-lp152.2.10.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13576</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13576" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13576" ref_url="https://www.suse.com/security/cve/CVE-2020-13576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HA3TV2KIWOULB64TPD5M3OU7SZTNM3P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTTRNQMJDLKQDLTKKDRQ4JCIQVTP2YE/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-13576/">CVE-2020-13576</cve>
	<bugzilla href="https://bugzilla.suse.com/1182098">SUSE bug 1182098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614335" comment="gsoap-devel-2.8.102-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009159475" comment="gsoap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614336" comment="gsoap-doc-2.8.102-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009159622" comment="gsoap-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614337" comment="libgsoap-2_8_102-2.8.102-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353378" comment="libgsoap-2_8_102 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612500" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612501" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612502" comment="libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612503" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612504" comment="libwebkit2gtk3-lang-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612505" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612506" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612507" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612508" comment="webkit-jsc-4-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612509" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612510" comment="webkit2gtk3-devel-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612511" comment="webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13625" ref_url="https://www.suse.com/security/cve/CVE-2020-13625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
    <description>
    PHPMailer before 6.1.6 contains an output escaping bug when the name of a file attachment contains a double quote character. This can result in the file type being misinterpreted by the receiver or any mail relay processing the message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-13625/">CVE-2020-13625</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615258" comment="cacti-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615259" comment="cacti-spine-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13630</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13631</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13632</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13645</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42QNVR5Y3Z3YQLA2G7H66ZAGRYHVNWHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ALNGEQGJBIVTIE7PVRV4LMX5VCNHFOZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WJQDO7GLZV6KOOPFA2ZGLO6YGORWTRO/" source="SUSE-SU"/>
    <description>
    In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628183" comment="balsa-2.6.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289523" comment="balsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628184" comment="balsa-lang-2.6.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289524" comment="balsa-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659463" comment="glib-networking-2.62.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659232" comment="glib-networking is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659464" comment="glib-networking-32bit-2.62.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659233" comment="glib-networking-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659465" comment="glib-networking-lang-2.62.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659234" comment="glib-networking-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610165" comment="qemu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610166" comment="qemu-arm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610167" comment="qemu-audio-alsa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610168" comment="qemu-audio-pa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610169" comment="qemu-audio-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610170" comment="qemu-block-curl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610171" comment="qemu-block-dmg-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610172" comment="qemu-block-gluster-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610173" comment="qemu-block-iscsi-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610174" comment="qemu-block-nfs-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610175" comment="qemu-block-rbd-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610176" comment="qemu-block-ssh-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610177" comment="qemu-extra-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610178" comment="qemu-guest-agent-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610179" comment="qemu-ipxe-1.0.0+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610180" comment="qemu-ksm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610181" comment="qemu-kvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610182" comment="qemu-lang-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610183" comment="qemu-linux-user-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610184" comment="qemu-microvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610185" comment="qemu-ppc-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610186" comment="qemu-s390-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610187" comment="qemu-seabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610188" comment="qemu-sgabios-8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610189" comment="qemu-testsuite-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610190" comment="qemu-tools-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610191" comment="qemu-ui-curses-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610192" comment="qemu-ui-gtk-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610193" comment="qemu-ui-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610194" comment="qemu-ui-spice-app-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610195" comment="qemu-vgabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610196" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610197" comment="qemu-x86-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0901-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3ME7Z7HY3RZGMZEXVYWABVMMLGMXE2S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V4YOO76ZUMWHQXJCEHC2KUOF54N5673X/" source="SUSE-SU"/>
    <description>
    Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615145" comment="python2-rsa-3.4.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479909" comment="python2-rsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615146" comment="python3-rsa-3.4.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479910" comment="python3-rsa is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13790</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007379.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1413-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611093" comment="libjpeg-turbo-1.5.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152540" comment="libjpeg-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611094" comment="libjpeg62-62.2.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152541" comment="libjpeg62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611095" comment="libjpeg62-32bit-62.2.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166381" comment="libjpeg62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611096" comment="libjpeg62-devel-62.2.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152542" comment="libjpeg62-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611097" comment="libjpeg62-devel-32bit-62.2.0-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166384" comment="libjpeg62-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611098" comment="libjpeg62-turbo-1.5.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166386" comment="libjpeg62-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611099" comment="libjpeg8-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611100" comment="libjpeg8-32bit-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152544" comment="libjpeg8-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611101" comment="libjpeg8-devel-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166390" comment="libjpeg8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611102" comment="libjpeg8-devel-32bit-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166392" comment="libjpeg8-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611103" comment="libturbojpeg0-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152545" comment="libturbojpeg0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611104" comment="libturbojpeg0-32bit-8.1.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166395" comment="libturbojpeg0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610165" comment="qemu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610166" comment="qemu-arm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610167" comment="qemu-audio-alsa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610168" comment="qemu-audio-pa-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610169" comment="qemu-audio-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610170" comment="qemu-block-curl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610171" comment="qemu-block-dmg-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610172" comment="qemu-block-gluster-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610173" comment="qemu-block-iscsi-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610174" comment="qemu-block-nfs-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610175" comment="qemu-block-rbd-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610176" comment="qemu-block-ssh-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610177" comment="qemu-extra-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610178" comment="qemu-guest-agent-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610179" comment="qemu-ipxe-1.0.0+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610180" comment="qemu-ksm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610181" comment="qemu-kvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610182" comment="qemu-lang-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610183" comment="qemu-linux-user-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610184" comment="qemu-microvm-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610185" comment="qemu-ppc-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610186" comment="qemu-s390-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610187" comment="qemu-seabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610188" comment="qemu-sgabios-8-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610189" comment="qemu-testsuite-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610190" comment="qemu-tools-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610191" comment="qemu-ui-curses-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610192" comment="qemu-ui-gtk-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610193" comment="qemu-ui-sdl-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610194" comment="qemu-ui-spice-app-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610195" comment="qemu-vgabios-1.12.1+-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610196" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610197" comment="qemu-x86-4.2.1-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609986" comment="ntp-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609987" comment="ntp-doc-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4EOEHZ7Q27TTGN54YMFIIKDEJ5OS3SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIESM64GYREKLMRLTSQUIOYAUT6QG6A2/" source="SUSE-SU"/>
    <description>
    Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611510" comment="cpp10-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296079" comment="cpp10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612469" comment="cpp7-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268648" comment="cpp7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611511" comment="cross-nvptx-gcc10-10.2.1+git583-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296080" comment="cross-nvptx-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611512" comment="cross-nvptx-newlib10-devel-10.2.1+git583-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296081" comment="cross-nvptx-newlib10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611513" comment="gcc10-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296082" comment="gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611514" comment="gcc10-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296083" comment="gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611515" comment="gcc10-ada-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296084" comment="gcc10-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611516" comment="gcc10-ada-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296085" comment="gcc10-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611517" comment="gcc10-c++-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296086" comment="gcc10-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611518" comment="gcc10-c++-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296087" comment="gcc10-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611519" comment="gcc10-d-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296088" comment="gcc10-d is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611520" comment="gcc10-d-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296089" comment="gcc10-d-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611521" comment="gcc10-fortran-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296090" comment="gcc10-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611522" comment="gcc10-fortran-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296091" comment="gcc10-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611523" comment="gcc10-go-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296092" comment="gcc10-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611524" comment="gcc10-go-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296093" comment="gcc10-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611525" comment="gcc10-info-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296094" comment="gcc10-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611526" comment="gcc10-locale-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296095" comment="gcc10-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611527" comment="gcc10-obj-c++-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296096" comment="gcc10-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611528" comment="gcc10-obj-c++-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296097" comment="gcc10-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611529" comment="gcc10-objc-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296098" comment="gcc10-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611530" comment="gcc10-objc-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296099" comment="gcc10-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612470" comment="gcc7-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268649" comment="gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612471" comment="gcc7-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268650" comment="gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612472" comment="gcc7-ada-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268651" comment="gcc7-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612473" comment="gcc7-ada-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268652" comment="gcc7-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612474" comment="gcc7-c++-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268653" comment="gcc7-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612475" comment="gcc7-c++-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268654" comment="gcc7-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612476" comment="gcc7-fortran-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268655" comment="gcc7-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612477" comment="gcc7-fortran-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268656" comment="gcc7-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612478" comment="gcc7-go-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268657" comment="gcc7-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612479" comment="gcc7-go-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268658" comment="gcc7-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612480" comment="gcc7-info-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268659" comment="gcc7-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612481" comment="gcc7-locale-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268660" comment="gcc7-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612482" comment="gcc7-obj-c++-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268661" comment="gcc7-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612483" comment="gcc7-obj-c++-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268662" comment="gcc7-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612484" comment="gcc7-objc-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268663" comment="gcc7-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612485" comment="gcc7-objc-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268664" comment="gcc7-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611531" comment="libada10-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296100" comment="libada10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611532" comment="libada10-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296101" comment="libada10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612486" comment="libada7-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268665" comment="libada7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612487" comment="libada7-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268666" comment="libada7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612488" comment="libasan4-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268667" comment="libasan4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612489" comment="libasan4-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268668" comment="libasan4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611533" comment="libasan6-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296102" comment="libasan6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611534" comment="libasan6-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296103" comment="libasan6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611535" comment="libatomic1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152915" comment="libatomic1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611536" comment="libatomic1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152916" comment="libatomic1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612490" comment="libcilkrts5-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152919" comment="libcilkrts5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612491" comment="libcilkrts5-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152920" comment="libcilkrts5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611537" comment="libgcc_s1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611538" comment="libgcc_s1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152932" comment="libgcc_s1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611539" comment="libgdruntime1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296104" comment="libgdruntime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611540" comment="libgdruntime1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296105" comment="libgdruntime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612492" comment="libgfortran4-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268669" comment="libgfortran4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612493" comment="libgfortran4-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268670" comment="libgfortran4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611541" comment="libgfortran5-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283969" comment="libgfortran5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611542" comment="libgfortran5-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283970" comment="libgfortran5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612494" comment="libgo11-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268671" comment="libgo11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612495" comment="libgo11-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268672" comment="libgo11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611543" comment="libgo16-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296106" comment="libgo16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611544" comment="libgo16-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296107" comment="libgo16-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611545" comment="libgomp1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152942" comment="libgomp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611546" comment="libgomp1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152943" comment="libgomp1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611547" comment="libgphobos1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296108" comment="libgphobos1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611548" comment="libgphobos1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296109" comment="libgphobos1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611549" comment="libitm1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152946" comment="libitm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611550" comment="libitm1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152947" comment="libitm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611551" comment="liblsan0-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152950" comment="liblsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611552" comment="libobjc4-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611553" comment="libobjc4-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152955" comment="libobjc4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611554" comment="libquadmath0-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152956" comment="libquadmath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611555" comment="libquadmath0-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152957" comment="libquadmath0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611556" comment="libstdc++6-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611557" comment="libstdc++6-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152963" comment="libstdc++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611558" comment="libstdc++6-devel-gcc10-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296110" comment="libstdc++6-devel-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611559" comment="libstdc++6-devel-gcc10-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296111" comment="libstdc++6-devel-gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612496" comment="libstdc++6-devel-gcc7-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268673" comment="libstdc++6-devel-gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612497" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268674" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611560" comment="libstdc++6-locale-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152968" comment="libstdc++6-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611561" comment="libstdc++6-pp-gcc10-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296112" comment="libstdc++6-pp-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611562" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296113" comment="libstdc++6-pp-gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611563" comment="libtsan0-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152969" comment="libtsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612498" comment="libubsan0-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152971" comment="libubsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612499" comment="libubsan0-32bit-7.5.0+r278197-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152972" comment="libubsan0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611564" comment="libubsan1-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283977" comment="libubsan1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611565" comment="libubsan1-32bit-10.2.1+git583-lp152.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283978" comment="libubsan1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611566" comment="nvptx-tools-1.0-lp152.4.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296114" comment="nvptx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13845" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13845" ref_url="https://www.suse.com/security/cve/CVE-2020-13845" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13845/">CVE-2020-13845</cve>
	<bugzilla href="https://bugzilla.suse.com/1174150">SUSE bug 1174150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609988" comment="singularity-3.6.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13846" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13846" ref_url="https://www.suse.com/security/cve/CVE-2020-13846" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.5.0 through 3.5.3 fails to report an error in a Status Code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13846/">CVE-2020-13846</cve>
	<bugzilla href="https://bugzilla.suse.com/1174148">SUSE bug 1174148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609988" comment="singularity-3.6.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13847" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13847" ref_url="https://www.suse.com/security/cve/CVE-2020-13847" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.0 through 3.5 lacks support for an Integrity Check. Singularity's sign and verify commands do not sign metadata found in the global header or data object descriptors of a SIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13847/">CVE-2020-13847</cve>
	<bugzilla href="https://bugzilla.suse.com/1174152">SUSE bug 1174152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609988" comment="singularity-3.6.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610216" comment="python2-targetcli-fb-2.1.52-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288926" comment="python2-targetcli-fb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610217" comment="python3-targetcli-fb-2.1.52-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288927" comment="python3-targetcli-fb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610218" comment="targetcli-fb-common-2.1.52-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288929" comment="targetcli-fb-common is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934</cve>
	<bugzilla href="https://bugzilla.suse.com/1174121">SUSE bug 1174121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610198" comment="tomcat-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610199" comment="tomcat-admin-webapps-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610200" comment="tomcat-docs-webapp-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610201" comment="tomcat-el-3_0-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610202" comment="tomcat-embed-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610203" comment="tomcat-javadoc-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610204" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610205" comment="tomcat-jsvc-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610206" comment="tomcat-lib-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610207" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610208" comment="tomcat-webapps-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610198" comment="tomcat-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610199" comment="tomcat-admin-webapps-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610200" comment="tomcat-docs-webapp-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610201" comment="tomcat-el-3_0-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610202" comment="tomcat-embed-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610203" comment="tomcat-javadoc-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610204" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610205" comment="tomcat-jsvc-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610206" comment="tomcat-lib-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610207" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610208" comment="tomcat-webapps-9.0.36-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13936</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X7H6XAK2KQMJUKMVVIRDA5YQLUSPV5YO/" source="SUSE-SU"/>
    <description>
    An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936</cve>
	<bugzilla href="https://bugzilla.suse.com/1183360">SUSE bug 1183360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613799" comment="velocity-1.7-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347970" comment="velocity is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613800" comment="velocity-demo-1.7-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347971" comment="velocity-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613801" comment="velocity-javadoc-1.7-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347972" comment="velocity-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613802" comment="velocity-manual-1.7-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347973" comment="velocity-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13943</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13943" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html" source="SUSE-SU"/>
    <description>
    If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943</cve>
	<bugzilla href="https://bugzilla.suse.com/1177582">SUSE bug 1177582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611797" comment="tomcat-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611798" comment="tomcat-admin-webapps-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611799" comment="tomcat-docs-webapp-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611800" comment="tomcat-el-3_0-api-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611801" comment="tomcat-embed-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611802" comment="tomcat-javadoc-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611803" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611804" comment="tomcat-jsvc-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611805" comment="tomcat-lib-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611806" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611807" comment="tomcat-webapps-9.0.36-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13950</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13950" ref_url="https://www.suse.com/security/cve/CVE-2020-13950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13950/">CVE-2020-13950</cve>
	<bugzilla href="https://bugzilla.suse.com/1187040">SUSE bug 1187040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13962" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962</cve>
	<bugzilla href="https://bugzilla.suse.com/1172726">SUSE bug 1172726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610859" comment="libQt5Bootstrap-devel-static-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610860" comment="libQt5Bootstrap-devel-static-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610861" comment="libQt5Concurrent-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610862" comment="libQt5Concurrent-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610863" comment="libQt5Concurrent5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610864" comment="libQt5Concurrent5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610865" comment="libQt5Core-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610866" comment="libQt5Core-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610867" comment="libQt5Core-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610868" comment="libQt5Core5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610869" comment="libQt5Core5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610870" comment="libQt5DBus-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610871" comment="libQt5DBus-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610872" comment="libQt5DBus-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610873" comment="libQt5DBus5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610874" comment="libQt5DBus5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610875" comment="libQt5Gui-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610876" comment="libQt5Gui-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610877" comment="libQt5Gui-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610878" comment="libQt5Gui5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610879" comment="libQt5Gui5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610880" comment="libQt5KmsSupport-devel-static-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245302" comment="libQt5KmsSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610881" comment="libQt5KmsSupport-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245303" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610882" comment="libQt5Network-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610883" comment="libQt5Network-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610884" comment="libQt5Network-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610885" comment="libQt5Network5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610886" comment="libQt5Network5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610887" comment="libQt5OpenGL-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610888" comment="libQt5OpenGL-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610889" comment="libQt5OpenGL-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610890" comment="libQt5OpenGL5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610891" comment="libQt5OpenGL5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610892" comment="libQt5OpenGLExtensions-devel-static-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610893" comment="libQt5OpenGLExtensions-devel-static-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610894" comment="libQt5PlatformHeaders-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610895" comment="libQt5PlatformSupport-devel-static-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610896" comment="libQt5PlatformSupport-devel-static-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610897" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610898" comment="libQt5PrintSupport-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610899" comment="libQt5PrintSupport-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610900" comment="libQt5PrintSupport-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610901" comment="libQt5PrintSupport5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610902" comment="libQt5PrintSupport5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610903" comment="libQt5Sql-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610904" comment="libQt5Sql-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610905" comment="libQt5Sql-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610906" comment="libQt5Sql5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610907" comment="libQt5Sql5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610908" comment="libQt5Sql5-mysql-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610909" comment="libQt5Sql5-mysql-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610910" comment="libQt5Sql5-postgresql-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610911" comment="libQt5Sql5-postgresql-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610912" comment="libQt5Sql5-sqlite-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610913" comment="libQt5Sql5-sqlite-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610914" comment="libQt5Sql5-unixODBC-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610915" comment="libQt5Sql5-unixODBC-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610916" comment="libQt5Test-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610917" comment="libQt5Test-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610918" comment="libQt5Test-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610919" comment="libQt5Test5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610920" comment="libQt5Test5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610921" comment="libQt5Widgets-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610922" comment="libQt5Widgets-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610923" comment="libQt5Widgets-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610924" comment="libQt5Widgets5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610925" comment="libQt5Widgets5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610926" comment="libQt5Xml-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610927" comment="libQt5Xml-devel-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610928" comment="libQt5Xml5-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610929" comment="libQt5Xml5-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610930" comment="libqt5-qtbase-common-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610931" comment="libqt5-qtbase-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610932" comment="libqt5-qtbase-examples-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610933" comment="libqt5-qtbase-examples-32bit-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610934" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177209" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610935" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291866" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610936" comment="libqt5-qtbase-private-headers-devel-5.12.7-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13977" ref_url="https://www.suse.com/security/cve/CVE-2020-13977" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RCXDSKLLDI4CG7PLAOOYGYVNNNQLL5WP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGYA3HEIHYY2MWEAOFFMZUBPGWKUXYI2/" source="SUSE-SU"/>
    <description>
    Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13977/">CVE-2020-13977</cve>
	<bugzilla href="https://bugzilla.suse.com/1172794">SUSE bug 1172794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614619" comment="nagios-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614620" comment="nagios-contrib-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614621" comment="nagios-devel-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614622" comment="nagios-theme-exfoliation-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614623" comment="nagios-www-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614624" comment="nagios-www-dch-4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193385">SUSE bug 1193385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615277" comment="iscsiuio-0.7.8.6-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474403" comment="iscsiuio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615278" comment="libopeniscsiusr0_2_0-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474405" comment="libopeniscsiusr0_2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615279" comment="open-iscsi-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474407" comment="open-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615280" comment="open-iscsi-devel-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474409" comment="open-iscsi-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193385">SUSE bug 1193385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615277" comment="iscsiuio-0.7.8.6-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474403" comment="iscsiuio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615278" comment="libopeniscsiusr0_2_0-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474405" comment="libopeniscsiusr0_2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615279" comment="open-iscsi-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474407" comment="open-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615280" comment="open-iscsi-devel-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474409" comment="open-iscsi-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14004</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14004" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14004" ref_url="https://www.suse.com/security/cve/CVE-2020-14004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1820-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14004/">CVE-2020-14004</cve>
	<bugzilla href="https://bugzilla.suse.com/1172171">SUSE bug 1172171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615281" comment="icinga2-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297975" comment="icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615282" comment="icinga2-bin-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297977" comment="icinga2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615283" comment="icinga2-common-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297979" comment="icinga2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615284" comment="icinga2-doc-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297981" comment="icinga2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615285" comment="icinga2-ido-mysql-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297983" comment="icinga2-ido-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615286" comment="icinga2-ido-pgsql-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297985" comment="icinga2-ido-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615287" comment="nano-icinga2-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297987" comment="nano-icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615288" comment="vim-icinga2-2.12.1-lp152.3.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297989" comment="vim-icinga2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019</cve>
	<bugzilla href="https://bugzilla.suse.com/1173257">SUSE bug 1173257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610230" comment="python2-rtslib-fb-2.1.73-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291446" comment="python2-rtslib-fb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610231" comment="python3-rtslib-fb-2.1.73-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291447" comment="python3-rtslib-fb is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039</cve>
	<bugzilla href="https://bugzilla.suse.com/1174191">SUSE bug 1174191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610161" comment="go1.13-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610162" comment="go1.13-doc-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610163" comment="go1.13-race-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611053" comment="go1.14-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611054" comment="go1.14-doc-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611055" comment="go1.14-race-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14059" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot management list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<bugzilla href="https://bugzilla.suse.com/1173303">SUSE bug 1173303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612713" comment="squid-4.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14093</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612714" comment="mutt-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612715" comment="mutt-doc-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612716" comment="mutt-lang-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606518" comment="neomutt-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606519" comment="neomutt-doc-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606520" comment="neomutt-lang-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34ALFN2MMC67CCWTOANPH5DLTSAHLOG/" source="SUSE-SU"/>
    <description>
    The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177569">SUSE bug 1177569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189078">SUSE bug 1189078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612448" comment="openssh-8.1p1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612449" comment="openssh-askpass-gnome-8.1p1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612450" comment="openssh-cavs-8.1p1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612451" comment="openssh-fips-8.1p1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612452" comment="openssh-helpers-8.1p1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612714" comment="mutt-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612715" comment="mutt-doc-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612716" comment="mutt-lang-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606518" comment="neomutt-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606519" comment="neomutt-doc-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606520" comment="neomutt-lang-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155</cve>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653930" comment="libpcre1-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653931" comment="libpcre1-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653932" comment="libpcre16-0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653933" comment="libpcre16-0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653934" comment="libpcrecpp0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653935" comment="libpcrecpp0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653936" comment="libpcreposix0-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653937" comment="libpcreposix0-32bit-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653938" comment="pcre-devel-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653939" comment="pcre-devel-static-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653940" comment="pcre-doc-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653941" comment="pcre-tools-8.45-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14196" ref_url="https://www.suse.com/security/cve/CVE-2020-14196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1055-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00134.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" source="SUSE-SU"/>
    <description>
    In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14196/">CVE-2020-14196</cve>
	<bugzilla href="https://bugzilla.suse.com/1173302">SUSE bug 1173302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615289" comment="pdns-recursor-4.3.5-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14295" ref_url="https://www.suse.com/security/cve/CVE-2020-14295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
    <description>
    A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14295/">CVE-2020-14295</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615258" comment="cacti-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615259" comment="cacti-spine-1.2.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14303</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<bugzilla href="https://bugzilla.suse.com/1173359">SUSE bug 1173359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610771" comment="ctdb-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610772" comment="ctdb-pcp-pmda-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610773" comment="ctdb-tests-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610774" comment="ldb-tools-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610775" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610776" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610777" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610778" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610779" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610780" comment="libdcerpc-samr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610781" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610782" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610783" comment="libldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610784" comment="libldb2-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610785" comment="libldb2-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610786" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610787" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610788" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610789" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610790" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610791" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610792" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610793" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610794" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610795" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610796" comment="libndr0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610797" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610798" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610799" comment="libnetapi-devel-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610800" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610801" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610802" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610803" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610804" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610805" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610806" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610807" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610808" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610809" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610810" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610811" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610812" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610813" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610814" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610815" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610816" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610817" comment="libsamba-policy0-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610818" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610819" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610820" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610821" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610822" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610823" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610824" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610825" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610826" comment="libsmbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610827" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610828" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610829" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610830" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610831" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610832" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610833" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610834" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610835" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610836" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610837" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610838" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610839" comment="python3-ldb-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610840" comment="python3-ldb-32bit-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610841" comment="python3-ldb-devel-2.0.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610842" comment="samba-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610843" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610844" comment="samba-ad-dc-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610845" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610846" comment="samba-client-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610847" comment="samba-client-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610848" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610849" comment="samba-doc-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610850" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610851" comment="samba-libs-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610852" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610853" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610854" comment="samba-libs-python3-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610855" comment="samba-python3-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610856" comment="samba-test-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610857" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610858" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14312</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5SXZU2UVUXVIVOLI6OT32WIQ6OJBE5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312</cve>
	<bugzilla href="https://bugzilla.suse.com/1173646">SUSE bug 1173646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653859" comment="dnsmasq-2.86-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653860" comment="dnsmasq-utils-2.86-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611019" comment="kernel-debug-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611020" comment="kernel-debug-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611021" comment="kernel-default-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611022" comment="kernel-default-base-5.3.18-lp152.41.1.lp152.8.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611023" comment="kernel-default-base-rebuild-5.3.18-lp152.41.1.lp152.8.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611024" comment="kernel-default-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611025" comment="kernel-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611026" comment="kernel-docs-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611027" comment="kernel-docs-html-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611028" comment="kernel-kvmsmall-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611029" comment="kernel-kvmsmall-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611030" comment="kernel-macros-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611031" comment="kernel-obs-build-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611032" comment="kernel-obs-qa-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611033" comment="kernel-preempt-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611034" comment="kernel-preempt-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611035" comment="kernel-source-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611036" comment="kernel-source-vanilla-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611037" comment="kernel-syms-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14318</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611845" comment="ctdb-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611846" comment="ctdb-pcp-pmda-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611847" comment="ctdb-tests-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611848" comment="libdcerpc-binding0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611849" comment="libdcerpc-binding0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611850" comment="libdcerpc-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611851" comment="libdcerpc-samr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611852" comment="libdcerpc-samr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611853" comment="libdcerpc-samr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611854" comment="libdcerpc0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611855" comment="libdcerpc0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611856" comment="libndr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611857" comment="libndr-krb5pac-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611858" comment="libndr-krb5pac0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611859" comment="libndr-krb5pac0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611860" comment="libndr-nbt-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611861" comment="libndr-nbt0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611862" comment="libndr-nbt0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611863" comment="libndr-standard-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611864" comment="libndr-standard0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611865" comment="libndr-standard0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611866" comment="libndr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611867" comment="libndr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611868" comment="libnetapi-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611869" comment="libnetapi-devel-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611870" comment="libnetapi0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611871" comment="libnetapi0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611872" comment="libsamba-credentials-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611873" comment="libsamba-credentials0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611874" comment="libsamba-credentials0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611875" comment="libsamba-errors-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611876" comment="libsamba-errors0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611877" comment="libsamba-errors0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611878" comment="libsamba-hostconfig-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611879" comment="libsamba-hostconfig0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611880" comment="libsamba-hostconfig0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611881" comment="libsamba-passdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611882" comment="libsamba-passdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611883" comment="libsamba-passdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611884" comment="libsamba-policy-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611885" comment="libsamba-policy-python3-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611886" comment="libsamba-policy0-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611887" comment="libsamba-policy0-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611888" comment="libsamba-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611889" comment="libsamba-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611890" comment="libsamba-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611891" comment="libsamdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611892" comment="libsamdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611893" comment="libsamdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611894" comment="libsmbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611895" comment="libsmbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611896" comment="libsmbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611897" comment="libsmbconf-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611898" comment="libsmbconf0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611899" comment="libsmbconf0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611900" comment="libsmbldap-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611901" comment="libsmbldap2-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611902" comment="libsmbldap2-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611903" comment="libtevent-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611904" comment="libtevent-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611905" comment="libtevent-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611906" comment="libwbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611907" comment="libwbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611908" comment="libwbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611909" comment="samba-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611910" comment="samba-ad-dc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611911" comment="samba-ad-dc-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611912" comment="samba-ceph-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611913" comment="samba-client-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611914" comment="samba-client-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611915" comment="samba-core-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611916" comment="samba-doc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611917" comment="samba-dsdb-modules-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611918" comment="samba-libs-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611919" comment="samba-libs-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611920" comment="samba-libs-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611921" comment="samba-libs-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611922" comment="samba-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611923" comment="samba-test-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611924" comment="samba-winbind-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611925" comment="samba-winbind-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14323</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611845" comment="ctdb-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611846" comment="ctdb-pcp-pmda-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611847" comment="ctdb-tests-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611848" comment="libdcerpc-binding0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611849" comment="libdcerpc-binding0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611850" comment="libdcerpc-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611851" comment="libdcerpc-samr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611852" comment="libdcerpc-samr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611853" comment="libdcerpc-samr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611854" comment="libdcerpc0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611855" comment="libdcerpc0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611856" comment="libndr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611857" comment="libndr-krb5pac-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611858" comment="libndr-krb5pac0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611859" comment="libndr-krb5pac0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611860" comment="libndr-nbt-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611861" comment="libndr-nbt0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611862" comment="libndr-nbt0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611863" comment="libndr-standard-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611864" comment="libndr-standard0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611865" comment="libndr-standard0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611866" comment="libndr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611867" comment="libndr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611868" comment="libnetapi-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611869" comment="libnetapi-devel-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611870" comment="libnetapi0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611871" comment="libnetapi0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611872" comment="libsamba-credentials-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611873" comment="libsamba-credentials0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611874" comment="libsamba-credentials0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611875" comment="libsamba-errors-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611876" comment="libsamba-errors0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611877" comment="libsamba-errors0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611878" comment="libsamba-hostconfig-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611879" comment="libsamba-hostconfig0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611880" comment="libsamba-hostconfig0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611881" comment="libsamba-passdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611882" comment="libsamba-passdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611883" comment="libsamba-passdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611884" comment="libsamba-policy-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611885" comment="libsamba-policy-python3-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611886" comment="libsamba-policy0-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611887" comment="libsamba-policy0-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611888" comment="libsamba-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611889" comment="libsamba-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611890" comment="libsamba-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611891" comment="libsamdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611892" comment="libsamdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611893" comment="libsamdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611894" comment="libsmbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611895" comment="libsmbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611896" comment="libsmbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611897" comment="libsmbconf-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611898" comment="libsmbconf0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611899" comment="libsmbconf0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611900" comment="libsmbldap-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611901" comment="libsmbldap2-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611902" comment="libsmbldap2-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611903" comment="libtevent-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611904" comment="libtevent-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611905" comment="libtevent-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611906" comment="libwbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611907" comment="libwbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611908" comment="libwbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611909" comment="samba-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611910" comment="samba-ad-dc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611911" comment="samba-ad-dc-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611912" comment="samba-ceph-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611913" comment="samba-client-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611914" comment="samba-client-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611915" comment="samba-core-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611916" comment="samba-doc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611917" comment="samba-dsdb-modules-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611918" comment="samba-libs-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611919" comment="samba-libs-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611920" comment="samba-libs-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611921" comment="samba-libs-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611922" comment="samba-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611923" comment="samba-test-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611924" comment="samba-winbind-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611925" comment="samba-winbind-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14331</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14339</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007278.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00058.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339</cve>
	<bugzilla href="https://bugzilla.suse.com/1174458">SUSE bug 1174458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611058" comment="libvirt-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611059" comment="libvirt-admin-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611060" comment="libvirt-bash-completion-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611061" comment="libvirt-client-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611062" comment="libvirt-daemon-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611063" comment="libvirt-daemon-config-network-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611064" comment="libvirt-daemon-config-nwfilter-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611065" comment="libvirt-daemon-driver-interface-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611066" comment="libvirt-daemon-driver-libxl-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611067" comment="libvirt-daemon-driver-lxc-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611068" comment="libvirt-daemon-driver-network-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611069" comment="libvirt-daemon-driver-nodedev-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611070" comment="libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611071" comment="libvirt-daemon-driver-qemu-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611072" comment="libvirt-daemon-driver-secret-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611073" comment="libvirt-daemon-driver-storage-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611074" comment="libvirt-daemon-driver-storage-core-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611075" comment="libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611076" comment="libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611077" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611078" comment="libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611079" comment="libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611080" comment="libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611081" comment="libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611082" comment="libvirt-daemon-hooks-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611083" comment="libvirt-daemon-lxc-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611084" comment="libvirt-daemon-qemu-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611085" comment="libvirt-daemon-xen-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611086" comment="libvirt-devel-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611087" comment="libvirt-devel-32bit-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611088" comment="libvirt-doc-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611089" comment="libvirt-libs-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611090" comment="libvirt-lock-sanlock-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611091" comment="libvirt-nss-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611092" comment="wireshark-plugin-libvirt-6.0.0-lp152.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14342</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/65NUX6IGI72XJIWLCF5QOKIKAWWJUMEY/" source="SUSE-SU"/>
    <description>
    It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1174477">SUSE bug 1174477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614463" comment="cifs-utils-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614464" comment="cifs-utils-devel-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294754" comment="cifs-utils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614465" comment="pam_cifscreds-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294755" comment="pam_cifscreds is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14343</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615302" comment="python2-PyYAML-5.3.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281491" comment="python2-PyYAML is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615514" comment="python3-PyYAML-5.3.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281492" comment="python3-PyYAML is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14344</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175880">SUSE bug 1175880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610303" comment="libX11-6-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610304" comment="libX11-6-32bit-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610305" comment="libX11-data-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610306" comment="libX11-devel-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610307" comment="libX11-devel-32bit-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610308" comment="libX11-xcb1-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610309" comment="libX11-xcb1-32bit-1.6.5-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610239" comment="libxcb-composite0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151866" comment="libxcb-composite0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610240" comment="libxcb-composite0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153818" comment="libxcb-composite0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610241" comment="libxcb-damage0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151867" comment="libxcb-damage0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610242" comment="libxcb-damage0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153819" comment="libxcb-damage0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610243" comment="libxcb-devel-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151868" comment="libxcb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610244" comment="libxcb-devel-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153820" comment="libxcb-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610245" comment="libxcb-devel-doc-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153821" comment="libxcb-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610246" comment="libxcb-dpms0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151869" comment="libxcb-dpms0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610247" comment="libxcb-dpms0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153822" comment="libxcb-dpms0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610248" comment="libxcb-dri2-0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151870" comment="libxcb-dri2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610249" comment="libxcb-dri2-0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151871" comment="libxcb-dri2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610250" comment="libxcb-dri3-0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151872" comment="libxcb-dri3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610251" comment="libxcb-dri3-0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151873" comment="libxcb-dri3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610252" comment="libxcb-glx0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151874" comment="libxcb-glx0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610253" comment="libxcb-glx0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151875" comment="libxcb-glx0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610254" comment="libxcb-present0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151876" comment="libxcb-present0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610255" comment="libxcb-present0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151877" comment="libxcb-present0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610256" comment="libxcb-randr0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151878" comment="libxcb-randr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610257" comment="libxcb-randr0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153823" comment="libxcb-randr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610258" comment="libxcb-record0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151879" comment="libxcb-record0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610259" comment="libxcb-record0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153824" comment="libxcb-record0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610260" comment="libxcb-render0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151880" comment="libxcb-render0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610261" comment="libxcb-render0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151881" comment="libxcb-render0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610262" comment="libxcb-res0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151882" comment="libxcb-res0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610263" comment="libxcb-res0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153825" comment="libxcb-res0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610264" comment="libxcb-screensaver0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151883" comment="libxcb-screensaver0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610265" comment="libxcb-screensaver0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153826" comment="libxcb-screensaver0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610266" comment="libxcb-shape0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151884" comment="libxcb-shape0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610267" comment="libxcb-shape0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153827" comment="libxcb-shape0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610268" comment="libxcb-shm0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151885" comment="libxcb-shm0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610269" comment="libxcb-shm0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151886" comment="libxcb-shm0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610270" comment="libxcb-sync1-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151887" comment="libxcb-sync1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610271" comment="libxcb-sync1-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151888" comment="libxcb-sync1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610272" comment="libxcb-xf86dri0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151890" comment="libxcb-xf86dri0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610273" comment="libxcb-xf86dri0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153829" comment="libxcb-xf86dri0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610274" comment="libxcb-xfixes0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151891" comment="libxcb-xfixes0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610275" comment="libxcb-xfixes0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151892" comment="libxcb-xfixes0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610276" comment="libxcb-xinerama0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151893" comment="libxcb-xinerama0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610277" comment="libxcb-xinerama0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153830" comment="libxcb-xinerama0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610278" comment="libxcb-xinput0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177183" comment="libxcb-xinput0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610279" comment="libxcb-xinput0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289014" comment="libxcb-xinput0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610280" comment="libxcb-xkb1-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151894" comment="libxcb-xkb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610281" comment="libxcb-xkb1-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153831" comment="libxcb-xkb1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610282" comment="libxcb-xtest0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151896" comment="libxcb-xtest0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610283" comment="libxcb-xtest0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153833" comment="libxcb-xtest0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610284" comment="libxcb-xv0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151897" comment="libxcb-xv0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610285" comment="libxcb-xv0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153834" comment="libxcb-xv0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610286" comment="libxcb-xvmc0-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151898" comment="libxcb-xvmc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610287" comment="libxcb-xvmc0-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153835" comment="libxcb-xvmc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610288" comment="libxcb1-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151899" comment="libxcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610289" comment="libxcb1-32bit-1.13-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151900" comment="libxcb1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14345</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181067">SUSE bug 1181067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610747" comment="xorg-x11-server-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610748" comment="xorg-x11-server-extra-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610749" comment="xorg-x11-server-sdk-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610750" comment="xorg-x11-server-source-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610751" comment="xorg-x11-server-wayland-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14346</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610747" comment="xorg-x11-server-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610748" comment="xorg-x11-server-extra-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610749" comment="xorg-x11-server-sdk-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610750" comment="xorg-x11-server-source-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610751" comment="xorg-x11-server-wayland-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610747" comment="xorg-x11-server-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610748" comment="xorg-x11-server-extra-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610749" comment="xorg-x11-server-sdk-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610750" comment="xorg-x11-server-source-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610751" comment="xorg-x11-server-wayland-1.20.3-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14349</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610502" comment="libecpg6-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610503" comment="libecpg6-32bit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610504" comment="libpq5-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610505" comment="libpq5-32bit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610368" comment="postgresql-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610369" comment="postgresql-contrib-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610370" comment="postgresql-devel-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610371" comment="postgresql-docs-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610372" comment="postgresql-llvmjit-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610373" comment="postgresql-plperl-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610374" comment="postgresql-plpython-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610375" comment="postgresql-pltcl-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610376" comment="postgresql-server-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610377" comment="postgresql-server-devel-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610378" comment="postgresql-test-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610938" comment="postgresql10-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610939" comment="postgresql10-contrib-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610940" comment="postgresql10-devel-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610941" comment="postgresql10-docs-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610942" comment="postgresql10-plperl-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610943" comment="postgresql10-plpython-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610944" comment="postgresql10-pltcl-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610945" comment="postgresql10-server-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610946" comment="postgresql10-test-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610388" comment="postgresql11-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291449" comment="postgresql11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610389" comment="postgresql11-contrib-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291450" comment="postgresql11-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610390" comment="postgresql11-devel-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291451" comment="postgresql11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610391" comment="postgresql11-docs-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291452" comment="postgresql11-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610392" comment="postgresql11-llvmjit-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291453" comment="postgresql11-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610393" comment="postgresql11-plperl-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291454" comment="postgresql11-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610394" comment="postgresql11-plpython-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291455" comment="postgresql11-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610395" comment="postgresql11-pltcl-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291456" comment="postgresql11-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610396" comment="postgresql11-server-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291457" comment="postgresql11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610397" comment="postgresql11-server-devel-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291458" comment="postgresql11-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610398" comment="postgresql11-test-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291459" comment="postgresql11-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610506" comment="postgresql12-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610507" comment="postgresql12-contrib-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610508" comment="postgresql12-devel-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610509" comment="postgresql12-docs-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610510" comment="postgresql12-llvmjit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610511" comment="postgresql12-plperl-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610512" comment="postgresql12-plpython-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610513" comment="postgresql12-pltcl-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610514" comment="postgresql12-server-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610515" comment="postgresql12-server-devel-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610516" comment="postgresql12-test-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610410" comment="postgresql96-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610411" comment="postgresql96-contrib-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610412" comment="postgresql96-devel-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610413" comment="postgresql96-docs-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610414" comment="postgresql96-plperl-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610415" comment="postgresql96-plpython-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610416" comment="postgresql96-pltcl-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610417" comment="postgresql96-server-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610418" comment="postgresql96-test-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179115">SUSE bug 1179115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610502" comment="libecpg6-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610503" comment="libecpg6-32bit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610504" comment="libpq5-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610505" comment="libpq5-32bit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610368" comment="postgresql-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610369" comment="postgresql-contrib-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610370" comment="postgresql-devel-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610371" comment="postgresql-docs-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610372" comment="postgresql-llvmjit-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610373" comment="postgresql-plperl-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610374" comment="postgresql-plpython-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610375" comment="postgresql-pltcl-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610376" comment="postgresql-server-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610377" comment="postgresql-server-devel-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610378" comment="postgresql-test-12.0.1-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610938" comment="postgresql10-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610939" comment="postgresql10-contrib-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610940" comment="postgresql10-devel-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610941" comment="postgresql10-docs-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610942" comment="postgresql10-plperl-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610943" comment="postgresql10-plpython-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610944" comment="postgresql10-pltcl-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610945" comment="postgresql10-server-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610946" comment="postgresql10-test-10.14-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610388" comment="postgresql11-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291449" comment="postgresql11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610389" comment="postgresql11-contrib-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291450" comment="postgresql11-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610390" comment="postgresql11-devel-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291451" comment="postgresql11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610391" comment="postgresql11-docs-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291452" comment="postgresql11-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610392" comment="postgresql11-llvmjit-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291453" comment="postgresql11-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610393" comment="postgresql11-plperl-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291454" comment="postgresql11-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610394" comment="postgresql11-plpython-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291455" comment="postgresql11-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610395" comment="postgresql11-pltcl-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291456" comment="postgresql11-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610396" comment="postgresql11-server-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291457" comment="postgresql11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610397" comment="postgresql11-server-devel-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291458" comment="postgresql11-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610398" comment="postgresql11-test-11.9-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291459" comment="postgresql11-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610506" comment="postgresql12-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610507" comment="postgresql12-contrib-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610508" comment="postgresql12-devel-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610509" comment="postgresql12-docs-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610510" comment="postgresql12-llvmjit-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610511" comment="postgresql12-plperl-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610512" comment="postgresql12-plpython-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610513" comment="postgresql12-pltcl-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610514" comment="postgresql12-server-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610515" comment="postgresql12-server-devel-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610516" comment="postgresql12-test-12.4-lp152.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610410" comment="postgresql96-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610411" comment="postgresql96-contrib-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610412" comment="postgresql96-devel-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610413" comment="postgresql96-docs-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610414" comment="postgresql96-plperl-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610415" comment="postgresql96-plpython-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610416" comment="postgresql96-pltcl-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610417" comment="postgresql96-server-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610418" comment="postgresql96-test-9.6.19-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14352</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMUBDUMWN7YJEDAXCHHKHS3ODSQ7RUOF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYLQMSF6PIISUQS6BSMK2ASAHIX4PTL5/" source="SUSE-SU"/>
    <description>
    A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352</cve>
	<bugzilla href="https://bugzilla.suse.com/1175475">SUSE bug 1175475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613136" comment="librepo-devel-1.12.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291461" comment="librepo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613137" comment="librepo0-1.12.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291462" comment="librepo0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613138" comment="python3-librepo-1.12.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291463" comment="python3-librepo is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14355</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1905-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611810" comment="libspice-client-glib-2_0-8-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151753" comment="libspice-client-glib-2_0-8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611811" comment="libspice-client-glib-helper-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154105" comment="libspice-client-glib-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611812" comment="libspice-client-gtk-3_0-5-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161282" comment="libspice-client-gtk-3_0-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611808" comment="libspice-server-devel-0.14.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611809" comment="libspice-server1-0.14.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611813" comment="spice-gtk-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174258" comment="spice-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611814" comment="spice-gtk-devel-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174259" comment="spice-gtk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611815" comment="spice-gtk-lang-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174260" comment="spice-gtk-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611816" comment="typelib-1_0-SpiceClientGlib-2_0-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151758" comment="typelib-1_0-SpiceClientGlib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611817" comment="typelib-1_0-SpiceClientGtk-3_0-0.37-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151759" comment="typelib-1_0-SpiceClientGtk-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14356</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14360</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612337" comment="xorg-x11-server-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612338" comment="xorg-x11-server-extra-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612339" comment="xorg-x11-server-sdk-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612340" comment="xorg-x11-server-source-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612341" comment="xorg-x11-server-wayland-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611014" comment="xorg-x11-server-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611015" comment="xorg-x11-server-extra-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611016" comment="xorg-x11-server-sdk-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611017" comment="xorg-x11-server-source-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611018" comment="xorg-x11-server-wayland-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611014" comment="xorg-x11-server-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611015" comment="xorg-x11-server-extra-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611016" comment="xorg-x11-server-sdk-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611017" comment="xorg-x11-server-source-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611018" comment="xorg-x11-server-wayland-1.20.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14363</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00018.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611007" comment="libX11-6-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611008" comment="libX11-6-32bit-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611009" comment="libX11-data-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611010" comment="libX11-devel-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611011" comment="libX11-devel-32bit-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611012" comment="libX11-xcb1-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611013" comment="libX11-xcb1-32bit-1.6.5-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14364</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14370</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4AHS44MM5VJQEFYSAEM4XLRKSPLU53H7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEYG3UZ6PAJGRLA4U75IIT2HGWDPPZWR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1176804">SUSE bug 1176804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612168" comment="podman-2.1.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612169" comment="podman-cni-config-2.1.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14372</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611427" comment="dpdk-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611428" comment="dpdk-devel-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611429" comment="dpdk-doc-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611430" comment="dpdk-examples-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611431" comment="dpdk-kmp-default-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611432" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611433" comment="dpdk-tools-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611434" comment="libdpdk-20_0-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14375</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14375" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611427" comment="dpdk-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611428" comment="dpdk-devel-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611429" comment="dpdk-doc-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611430" comment="dpdk-examples-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611431" comment="dpdk-kmp-default-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611432" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611433" comment="dpdk-tools-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611434" comment="libdpdk-20_0-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14376</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14376" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611427" comment="dpdk-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611428" comment="dpdk-devel-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611429" comment="dpdk-doc-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611430" comment="dpdk-examples-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611431" comment="dpdk-kmp-default-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611432" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611433" comment="dpdk-tools-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611434" comment="libdpdk-20_0-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14377</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14377" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14377" ref_url="https://www.suse.com/security/cve/CVE-2020-14377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14377/">CVE-2020-14377</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611427" comment="dpdk-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611428" comment="dpdk-devel-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611429" comment="dpdk-doc-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611430" comment="dpdk-examples-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611431" comment="dpdk-kmp-default-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611432" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611433" comment="dpdk-tools-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611434" comment="libdpdk-20_0-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14378</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611427" comment="dpdk-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611428" comment="dpdk-devel-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611429" comment="dpdk-doc-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611430" comment="dpdk-examples-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611431" comment="dpdk-kmp-default-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611432" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_lp152.41-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611433" comment="dpdk-tools-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611434" comment="libdpdk-20_0-19.11.4-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14383</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611845" comment="ctdb-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611846" comment="ctdb-pcp-pmda-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611847" comment="ctdb-tests-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611848" comment="libdcerpc-binding0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611849" comment="libdcerpc-binding0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611850" comment="libdcerpc-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611851" comment="libdcerpc-samr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611852" comment="libdcerpc-samr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611853" comment="libdcerpc-samr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611854" comment="libdcerpc0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611855" comment="libdcerpc0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611856" comment="libndr-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611857" comment="libndr-krb5pac-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611858" comment="libndr-krb5pac0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611859" comment="libndr-krb5pac0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611860" comment="libndr-nbt-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611861" comment="libndr-nbt0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611862" comment="libndr-nbt0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611863" comment="libndr-standard-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611864" comment="libndr-standard0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611865" comment="libndr-standard0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611866" comment="libndr0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611867" comment="libndr0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611868" comment="libnetapi-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611869" comment="libnetapi-devel-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611870" comment="libnetapi0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611871" comment="libnetapi0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611872" comment="libsamba-credentials-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611873" comment="libsamba-credentials0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611874" comment="libsamba-credentials0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611875" comment="libsamba-errors-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611876" comment="libsamba-errors0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611877" comment="libsamba-errors0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611878" comment="libsamba-hostconfig-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611879" comment="libsamba-hostconfig0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611880" comment="libsamba-hostconfig0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611881" comment="libsamba-passdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611882" comment="libsamba-passdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611883" comment="libsamba-passdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611884" comment="libsamba-policy-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611885" comment="libsamba-policy-python3-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611886" comment="libsamba-policy0-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611887" comment="libsamba-policy0-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611888" comment="libsamba-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611889" comment="libsamba-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611890" comment="libsamba-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611891" comment="libsamdb-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611892" comment="libsamdb0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611893" comment="libsamdb0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611894" comment="libsmbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611895" comment="libsmbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611896" comment="libsmbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611897" comment="libsmbconf-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611898" comment="libsmbconf0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611899" comment="libsmbconf0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611900" comment="libsmbldap-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611901" comment="libsmbldap2-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611902" comment="libsmbldap2-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611903" comment="libtevent-util-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611904" comment="libtevent-util0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611905" comment="libtevent-util0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611906" comment="libwbclient-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611907" comment="libwbclient0-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611908" comment="libwbclient0-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611909" comment="samba-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611910" comment="samba-ad-dc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611911" comment="samba-ad-dc-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611912" comment="samba-ceph-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611913" comment="samba-client-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611914" comment="samba-client-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611915" comment="samba-core-devel-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611916" comment="samba-doc-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611917" comment="samba-dsdb-modules-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611918" comment="samba-libs-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611919" comment="samba-libs-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611920" comment="samba-libs-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611921" comment="samba-libs-python3-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611922" comment="samba-python3-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611923" comment="samba-test-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611924" comment="samba-winbind-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611925" comment="samba-winbind-32bit-4.11.14+git.202.344b137b75d-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14385</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611019" comment="kernel-debug-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611020" comment="kernel-debug-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611021" comment="kernel-default-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611022" comment="kernel-default-base-5.3.18-lp152.41.1.lp152.8.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611023" comment="kernel-default-base-rebuild-5.3.18-lp152.41.1.lp152.8.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611024" comment="kernel-default-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611025" comment="kernel-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611026" comment="kernel-docs-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611027" comment="kernel-docs-html-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611028" comment="kernel-kvmsmall-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611029" comment="kernel-kvmsmall-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611030" comment="kernel-macros-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611031" comment="kernel-obs-build-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611032" comment="kernel-obs-qa-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611033" comment="kernel-preempt-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611034" comment="kernel-preempt-devel-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611035" comment="kernel-source-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611036" comment="kernel-source-vanilla-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611037" comment="kernel-syms-5.3.18-lp152.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14390</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14392</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    An untrusted pointer dereference flaw was found in Perl-DBI &lt; 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611152" comment="perl-DBI-1.642-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in perl-DBI &lt; 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611152" comment="perl-DBI-1.642-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14400</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.4.16, a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612718" comment="kernel-debug-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612719" comment="kernel-debug-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612720" comment="kernel-default-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612721" comment="kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612722" comment="kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612723" comment="kernel-default-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612724" comment="kernel-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612725" comment="kernel-docs-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612726" comment="kernel-docs-html-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612727" comment="kernel-kvmsmall-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612728" comment="kernel-kvmsmall-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612729" comment="kernel-macros-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612730" comment="kernel-obs-build-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612731" comment="kernel-obs-qa-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612732" comment="kernel-preempt-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612733" comment="kernel-preempt-devel-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612734" comment="kernel-source-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612735" comment="kernel-source-vanilla-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612736" comment="kernel-syms-5.3.18-lp152.26.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609985" comment="python-ipaddress-1.0.18-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287509" comment="python-ipaddress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14424</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14424" ref_url="https://www.suse.com/security/cve/CVE-2020-14424" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBZLNMUSFBOJOEX22NOPCJOWBJDHPBAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NZJSSIG6ZIT5F2CRYU4MLRUHPBV6XTL/" source="SUSE-SU"/>
    <description>
    Cacti before 1.2.18 allows remote attackers to trigger XSS via template import for the midwinter theme.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14424/">CVE-2020-14424</cve>
	<bugzilla href="https://bugzilla.suse.com/1188188">SUSE bug 1188188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631862" comment="cacti-1.2.18-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631863" comment="cacti-spine-1.2.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14579</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14581</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14583</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610335" comment="java-11-openjdk-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610336" comment="java-11-openjdk-accessibility-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610337" comment="java-11-openjdk-demo-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610338" comment="java-11-openjdk-devel-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610339" comment="java-11-openjdk-headless-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610340" comment="java-11-openjdk-javadoc-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610341" comment="java-11-openjdk-jmods-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610342" comment="java-11-openjdk-src-11.0.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14628</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14628" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14628" ref_url="https://www.suse.com/security/cve/CVE-2020-14628" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14628 is applicable to Windows VM only. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14628/">CVE-2020-14628</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14629</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14629" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14629" ref_url="https://www.suse.com/security/cve/CVE-2020-14629" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14629/">CVE-2020-14629</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14646</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14646" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14646" ref_url="https://www.suse.com/security/cve/CVE-2020-14646" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14646/">CVE-2020-14646</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14647" ref_url="https://www.suse.com/security/cve/CVE-2020-14647" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14647/">CVE-2020-14647</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14648" ref_url="https://www.suse.com/security/cve/CVE-2020-14648" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14648/">CVE-2020-14648</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14649</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14649" ref_url="https://www.suse.com/security/cve/CVE-2020-14649" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14649/">CVE-2020-14649</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14650</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14650" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14650" ref_url="https://www.suse.com/security/cve/CVE-2020-14650" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14650/">CVE-2020-14650</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14673" ref_url="https://www.suse.com/security/cve/CVE-2020-14673" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14673/">CVE-2020-14673</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14674" ref_url="https://www.suse.com/security/cve/CVE-2020-14674" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14674/">CVE-2020-14674</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14675" ref_url="https://www.suse.com/security/cve/CVE-2020-14675" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14675/">CVE-2020-14675</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14676" ref_url="https://www.suse.com/security/cve/CVE-2020-14676" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14676/">CVE-2020-14676</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14677" ref_url="https://www.suse.com/security/cve/CVE-2020-14677" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14677/">CVE-2020-14677</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14694" ref_url="https://www.suse.com/security/cve/CVE-2020-14694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14694/">CVE-2020-14694</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14695" ref_url="https://www.suse.com/security/cve/CVE-2020-14695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14695/">CVE-2020-14695</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14698" ref_url="https://www.suse.com/security/cve/CVE-2020-14698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14698/">CVE-2020-14698</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14699" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14699" ref_url="https://www.suse.com/security/cve/CVE-2020-14699" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14699/">CVE-2020-14699</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14700" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14700" ref_url="https://www.suse.com/security/cve/CVE-2020-14700" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14700/">CVE-2020-14700</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14703" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14703" ref_url="https://www.suse.com/security/cve/CVE-2020-14703" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14703/">CVE-2020-14703</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14704" ref_url="https://www.suse.com/security/cve/CVE-2020-14704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14704/">CVE-2020-14704</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14707" ref_url="https://www.suse.com/security/cve/CVE-2020-14707" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14707/">CVE-2020-14707</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14711" ref_url="https://www.suse.com/security/cve/CVE-2020-14711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14711 is applicable to macOS host only. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14711/">CVE-2020-14711</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14712" ref_url="https://www.suse.com/security/cve/CVE-2020-14712" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14712/">CVE-2020-14712</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14713" ref_url="https://www.suse.com/security/cve/CVE-2020-14713" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14713/">CVE-2020-14713</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14714</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14714" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14714" ref_url="https://www.suse.com/security/cve/CVE-2020-14714" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14714/">CVE-2020-14714</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14715</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14715" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14715" ref_url="https://www.suse.com/security/cve/CVE-2020-14715" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14715/">CVE-2020-14715</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611153" comment="python3-virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611154" comment="virtualbox-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611155" comment="virtualbox-devel-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611156" comment="virtualbox-guest-desktop-icons-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611157" comment="virtualbox-guest-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611158" comment="virtualbox-guest-tools-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611159" comment="virtualbox-guest-x11-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611160" comment="virtualbox-host-source-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611161" comment="virtualbox-kmp-default-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611162" comment="virtualbox-kmp-preempt-6.1.14_k5.3.18_lp152.41-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611163" comment="virtualbox-qt-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611164" comment="virtualbox-vnc-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611165" comment="virtualbox-websrv-6.1.14-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472" source="SUSE CVE"/>
		<reference ref_id="BLOG-ZEROLOGON" ref_url="https://www.suse.com/c/suse-addresses-zerologon-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<reference ref_id="TID000019713" ref_url="https://www.suse.com/support/kb/doc/?id=000019713" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611202" comment="ctdb-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611203" comment="ctdb-pcp-pmda-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611204" comment="ctdb-tests-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611205" comment="libdcerpc-binding0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611206" comment="libdcerpc-binding0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611207" comment="libdcerpc-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611208" comment="libdcerpc-samr-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611209" comment="libdcerpc-samr0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611210" comment="libdcerpc-samr0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611211" comment="libdcerpc0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611212" comment="libdcerpc0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611213" comment="libndr-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611214" comment="libndr-krb5pac-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611215" comment="libndr-krb5pac0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611216" comment="libndr-krb5pac0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611217" comment="libndr-nbt-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611218" comment="libndr-nbt0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611219" comment="libndr-nbt0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611220" comment="libndr-standard-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611221" comment="libndr-standard0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611222" comment="libndr-standard0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611223" comment="libndr0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611224" comment="libndr0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611225" comment="libnetapi-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611226" comment="libnetapi-devel-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611227" comment="libnetapi0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611228" comment="libnetapi0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611229" comment="libsamba-credentials-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611230" comment="libsamba-credentials0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611231" comment="libsamba-credentials0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611232" comment="libsamba-errors-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611233" comment="libsamba-errors0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611234" comment="libsamba-errors0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611235" comment="libsamba-hostconfig-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611236" comment="libsamba-hostconfig0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611237" comment="libsamba-hostconfig0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611238" comment="libsamba-passdb-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611239" comment="libsamba-passdb0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611240" comment="libsamba-passdb0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611241" comment="libsamba-policy-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611242" comment="libsamba-policy-python3-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611243" comment="libsamba-policy0-python3-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611244" comment="libsamba-policy0-python3-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611245" comment="libsamba-util-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611246" comment="libsamba-util0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611247" comment="libsamba-util0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611248" comment="libsamdb-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611249" comment="libsamdb0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611250" comment="libsamdb0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611251" comment="libsmbclient-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611252" comment="libsmbclient0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611253" comment="libsmbclient0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611254" comment="libsmbconf-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611255" comment="libsmbconf0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611256" comment="libsmbconf0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611257" comment="libsmbldap-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611258" comment="libsmbldap2-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611259" comment="libsmbldap2-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611260" comment="libtevent-util-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611261" comment="libtevent-util0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611262" comment="libtevent-util0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611263" comment="libwbclient-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611264" comment="libwbclient0-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611265" comment="libwbclient0-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611266" comment="samba-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611267" comment="samba-ad-dc-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611268" comment="samba-ad-dc-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611269" comment="samba-ceph-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611270" comment="samba-client-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611271" comment="samba-client-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611272" comment="samba-core-devel-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611273" comment="samba-doc-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611274" comment="samba-dsdb-modules-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611275" comment="samba-libs-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611276" comment="samba-libs-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611277" comment="samba-libs-python3-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611278" comment="samba-libs-python3-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611279" comment="samba-python3-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611280" comment="samba-test-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611281" comment="samba-winbind-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611282" comment="samba-winbind-32bit-4.11.13+git.189.e9bd318cd13-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612230" comment="libmariadb-devel-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612231" comment="libmariadb3-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612232" comment="libmariadb3-32bit-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612233" comment="libmariadb_plugins-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612453" comment="libmariadbd-devel-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612454" comment="libmariadbd19-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612234" comment="libmariadbprivate-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612455" comment="mariadb-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612456" comment="mariadb-bench-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612457" comment="mariadb-client-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612458" comment="mariadb-errormessages-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612459" comment="mariadb-galera-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612460" comment="mariadb-rpm-macros-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612461" comment="mariadb-test-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612462" comment="mariadb-tools-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612230" comment="libmariadb-devel-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612231" comment="libmariadb3-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612232" comment="libmariadb3-32bit-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612233" comment="libmariadb_plugins-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612453" comment="libmariadbd-devel-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612454" comment="libmariadbd19-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612234" comment="libmariadbprivate-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612455" comment="mariadb-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612456" comment="mariadb-bench-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612457" comment="mariadb-client-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612458" comment="mariadb-errormessages-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612459" comment="mariadb-galera-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612460" comment="mariadb-rpm-macros-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612461" comment="mariadb-test-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612462" comment="mariadb-tools-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612230" comment="libmariadb-devel-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612231" comment="libmariadb3-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612232" comment="libmariadb3-32bit-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612233" comment="libmariadb_plugins-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612453" comment="libmariadbd-devel-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612454" comment="libmariadbd19-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612234" comment="libmariadbprivate-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612455" comment="mariadb-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612456" comment="mariadb-bench-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612457" comment="mariadb-client-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612458" comment="mariadb-errormessages-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612459" comment="mariadb-galera-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612460" comment="mariadb-rpm-macros-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612461" comment="mariadb-test-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612462" comment="mariadb-tools-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14796</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612223" comment="java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612224" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612225" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612226" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612227" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612228" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612229" comment="java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6Q2IB2YXUXIWFBPF2P2FIHVNJLBUPC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612075" comment="java-11-openjdk-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612076" comment="java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612077" comment="java-11-openjdk-demo-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612078" comment="java-11-openjdk-devel-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612079" comment="java-11-openjdk-headless-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612080" comment="java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612081" comment="java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612082" comment="java-11-openjdk-src-11.0.9.0-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611983" comment="java-1_8_0-openj9-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611984" comment="java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611985" comment="java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611986" comment="java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611987" comment="java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611988" comment="java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611989" comment="java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613516" comment="java-1_8_0-openjdk-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613517" comment="java-1_8_0-openjdk-accessibility-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613518" comment="java-1_8_0-openjdk-demo-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613519" comment="java-1_8_0-openjdk-devel-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613520" comment="java-1_8_0-openjdk-headless-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613521" comment="java-1_8_0-openjdk-javadoc-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613522" comment="java-1_8_0-openjdk-src-1.8.0.282-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612230" comment="libmariadb-devel-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612231" comment="libmariadb3-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612232" comment="libmariadb3-32bit-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612233" comment="libmariadb_plugins-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612453" comment="libmariadbd-devel-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612454" comment="libmariadbd19-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612234" comment="libmariadbprivate-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612455" comment="mariadb-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612456" comment="mariadb-bench-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612457" comment="mariadb-client-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612458" comment="mariadb-errormessages-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612459" comment="mariadb-galera-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612460" comment="mariadb-rpm-macros-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612461" comment="mariadb-test-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612462" comment="mariadb-tools-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14928</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14928" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14928" ref_url="https://www.suse.com/security/cve/CVE-2020-14928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3CUVYOHJVMCTZXIKRZXRNXLROM7HCFQ/" source="SUSE-SU"/>
    <description>
    evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14928/">CVE-2020-14928</cve>
	<bugzilla href="https://bugzilla.suse.com/1173910">SUSE bug 1173910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613876" comment="evolution-data-server-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348193" comment="evolution-data-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613877" comment="evolution-data-server-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348194" comment="evolution-data-server-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613878" comment="evolution-data-server-devel-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348195" comment="evolution-data-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613879" comment="evolution-data-server-lang-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348196" comment="evolution-data-server-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613880" comment="evolution-ews-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348197" comment="evolution-ews is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613881" comment="evolution-ews-lang-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348198" comment="evolution-ews-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613882" comment="libcamel-1_2-62-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348199" comment="libcamel-1_2-62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613883" comment="libcamel-1_2-62-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348200" comment="libcamel-1_2-62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613884" comment="libebackend-1_2-10-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348201" comment="libebackend-1_2-10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613885" comment="libebackend-1_2-10-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348202" comment="libebackend-1_2-10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613886" comment="libebook-1_2-20-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348203" comment="libebook-1_2-20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613887" comment="libebook-1_2-20-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348204" comment="libebook-1_2-20-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613888" comment="libebook-contacts-1_2-3-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348205" comment="libebook-contacts-1_2-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613889" comment="libebook-contacts-1_2-3-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348206" comment="libebook-contacts-1_2-3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613890" comment="libecal-2_0-1-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348207" comment="libecal-2_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613891" comment="libecal-2_0-1-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348208" comment="libecal-2_0-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613892" comment="libedata-book-1_2-26-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348209" comment="libedata-book-1_2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613893" comment="libedata-book-1_2-26-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348210" comment="libedata-book-1_2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613894" comment="libedata-cal-2_0-1-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348211" comment="libedata-cal-2_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613895" comment="libedata-cal-2_0-1-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348212" comment="libedata-cal-2_0-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613896" comment="libedataserver-1_2-24-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348213" comment="libedataserver-1_2-24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613897" comment="libedataserver-1_2-24-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348214" comment="libedataserver-1_2-24-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613898" comment="libedataserverui-1_2-2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348215" comment="libedataserverui-1_2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613899" comment="libedataserverui-1_2-2-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348216" comment="libedataserverui-1_2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613900" comment="typelib-1_0-Camel-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348217" comment="typelib-1_0-Camel-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613901" comment="typelib-1_0-EBackend-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348218" comment="typelib-1_0-EBackend-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613902" comment="typelib-1_0-EBook-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348219" comment="typelib-1_0-EBook-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613903" comment="typelib-1_0-EBookContacts-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348220" comment="typelib-1_0-EBookContacts-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613904" comment="typelib-1_0-ECal-2_0-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348221" comment="typelib-1_0-ECal-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613905" comment="typelib-1_0-EDataBook-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348222" comment="typelib-1_0-EDataBook-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613906" comment="typelib-1_0-EDataCal-2_0-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348223" comment="typelib-1_0-EDataCal-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613907" comment="typelib-1_0-EDataServer-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348224" comment="typelib-1_0-EDataServer-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613908" comment="typelib-1_0-EDataServerUI-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348225" comment="typelib-1_0-EDataServerUI-1_2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14929</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14929" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14929" ref_url="https://www.suse.com/security/cve/CVE-2020-14929" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZRQIHG7XRVXHNCK66IMEPQ7LPQIJT4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A75UA3SG5RXQXANEALFPKTVRRYONZKUR/" source="SUSE-SU"/>
    <description>
    Alpine before 2.23 silently proceeds to use an insecure connection after a /tls is sent in certain circumstances involving PREAUTH, which is a less secure behavior than the alternative of closing the connection and letting the user decide what they would like to do.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14929/">CVE-2020-14929</cve>
	<bugzilla href="https://bugzilla.suse.com/1173281">SUSE bug 1173281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614558" comment="alpine-2.24-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353680" comment="alpine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614559" comment="pico-5.07-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353681" comment="pico is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614560" comment="pilot-2.99-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353682" comment="pilot is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14954</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14954" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612714" comment="mutt-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612715" comment="mutt-doc-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612716" comment="mutt-lang-1.10.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606518" comment="neomutt-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606519" comment="neomutt-doc-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606520" comment="neomutt-lang-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14983" ref_url="https://www.suse.com/security/cve/CVE-2020-14983" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0947-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14983/">CVE-2020-14983</cve>
	<bugzilla href="https://bugzilla.suse.com/1173595">SUSE bug 1173595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612740" comment="chocolate-doom-3.0.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286911" comment="chocolate-doom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612741" comment="chocolate-doom-bash-completion-3.0.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286912" comment="chocolate-doom-bash-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15011" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611666" comment="mailman-2.1.34-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15025</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609986" comment="ntp-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609987" comment="ntp-doc-4.2.8p15-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049" source="SUSE CVE"/>
		<reference ref_id="GHSA-qf3v-rc95-96j5" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-qf3v-rc95-96j5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174381">SUSE bug 1174381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611006" comment="squid-4.13-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/" source="SUSE-SU"/>
    <description>
    OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078</cve>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614668" comment="openvpn-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152221" comment="openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614669" comment="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157252" comment="openvpn-auth-pam-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614670" comment="openvpn-devel-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157253" comment="openvpn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614671" comment="openvpn-down-root-plugin-2.4.3-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157254" comment="openvpn-down-root-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1644-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "&lt;protocol&gt;://[&lt;user&gt;[:&lt;password&gt;]@]&lt;hostname&gt;[:&lt;port&gt;][:][/]&lt;path&gt;". The password value is not redacted and is printed to stdout and also to any generated log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611448" comment="nodejs10-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611449" comment="nodejs10-devel-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611450" comment="nodejs10-docs-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611443" comment="nodejs12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611444" comment="nodejs12-devel-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611445" comment="nodejs12-docs-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611451" comment="npm10-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611446" comment="npm12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFPGMWNYFF7TPILP2K22BE5SUUBZBMNS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PNPGMJDNXG4YN2UCUL54ZUIYNPJTE25F/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166</cve>
	<bugzilla href="https://bugzilla.suse.com/1176116">SUSE bug 1176116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612008" comment="libunwind-1.2.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177215" comment="libunwind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612009" comment="libunwind-32bit-1.2.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243091" comment="libunwind-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612010" comment="libunwind-devel-1.2.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243092" comment="libunwind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612011" comment="libzmq5-4.2.3-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243098" comment="libzmq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612012" comment="zeromq-devel-4.2.3-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243101" comment="zeromq-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612013" comment="zeromq-tools-4.2.3-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243102" comment="zeromq-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15169</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15169" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<bugzilla href="https://bugzilla.suse.com/1176421">SUSE bug 1176421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612230" comment="libmariadb-devel-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612231" comment="libmariadb3-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612232" comment="libmariadb3-32bit-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612233" comment="libmariadb_plugins-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612453" comment="libmariadbd-devel-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612454" comment="libmariadbd19-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612234" comment="libmariadbprivate-3.1.11-lp152.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612455" comment="mariadb-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612456" comment="mariadb-bench-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612457" comment="mariadb-client-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612458" comment="mariadb-errormessages-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612459" comment="mariadb-galera-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612460" comment="mariadb-rpm-macros-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612461" comment="mariadb-test-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612462" comment="mariadb-tools-10.4.17-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15190</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15190" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15190" ref_url="https://www.suse.com/security/cve/CVE-2020-15190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15190/">CVE-2020-15190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15191</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15191" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15191" ref_url="https://www.suse.com/security/cve/CVE-2020-15191" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15191/">CVE-2020-15191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15192</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15192" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15192" ref_url="https://www.suse.com/security/cve/CVE-2020-15192" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15192/">CVE-2020-15192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15193" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15193" ref_url="https://www.suse.com/security/cve/CVE-2020-15193" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory address is due to a `reinterpret_cast` Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15193/">CVE-2020-15193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15194</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15194" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15194" ref_url="https://www.suse.com/security/cve/CVE-2020-15194" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15194/">CVE-2020-15194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15195</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15195" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15195" ref_url="https://www.suse.com/security/cve/CVE-2020-15195" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern. It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15195/">CVE-2020-15195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15202</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15202" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15202" ref_url="https://www.suse.com/security/cve/CVE-2020-15202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments. However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used. In these cases, if the amount of work to be parallelized is large enough, integer truncation occurs. Depending on how the two arguments of the lambda are used, this can result in segfaults, read/write outside of heap allocated arrays, stack overflows, or data corruption. The issue is patched in commits 27b417360cbd671ef55915e4bb6bb06af8b8a832 and ca8c013b5e97b1373b3bb1c97ea655e69f31a575, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15202/">CVE-2020-15202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15203" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15203" ref_url="https://www.suse.com/security/cve/CVE-2020-15203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15203/">CVE-2020-15203</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15204" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15204" ref_url="https://www.suse.com/security/cve/CVE-2020-15204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx-&gt;session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault. The issue is patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15204/">CVE-2020-15204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15205</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15205" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15205" ref_url="https://www.suse.com/security/cve/CVE-2020-15205" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `tf.raw_ops.StringNGrams` lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after `ee ff` are contents from the memory stack. Since these can contain return addresses, this data leak can be used to defeat ASLR. The issue is patched in commit 0462de5b544ed4731aa2fb23946ac22c01856b80, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15205/">CVE-2020-15205</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15206</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15206" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15206" ref_url="https://www.suse.com/security/cve/CVE-2020-15206" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15206/">CVE-2020-15206</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15207" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15207" ref_url="https://www.suse.com/security/cve/CVE-2020-15207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-15207/">CVE-2020-15207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15208" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15208" ref_url="https://www.suse.com/security/cve/CVE-2020-15208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. The issue is patched in commit 8ee24e7949a203d234489f9da2c5bf45a7d5157d, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15208/">CVE-2020-15208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15209</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15209" ref_url="https://www.suse.com/security/cve/CVE-2020-15209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15209/">CVE-2020-15209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15210</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15210" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15210" ref_url="https://www.suse.com/security/cve/CVE-2020-15210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15210/">CVE-2020-15210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15211</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15211" ref_url="https://www.suse.com/security/cve/CVE-2020-15211" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00185.html" source="SUSE-SU"/>
    <description>
    In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15211/">CVE-2020-15211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611711" comment="libtensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297592" comment="libtensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611712" comment="libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297593" comment="libtensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611713" comment="libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297594" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611714" comment="libtensorflow_cc2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297595" comment="libtensorflow_cc2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611715" comment="libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297596" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611716" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297597" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611717" comment="libtensorflow_framework2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297598" comment="libtensorflow_framework2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611718" comment="libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297599" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611719" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297600" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611720" comment="tensorflow2-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297601" comment="tensorflow2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611721" comment="tensorflow2-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297602" comment="tensorflow2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611722" comment="tensorflow2-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297603" comment="tensorflow2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611723" comment="tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297604" comment="tensorflow2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611724" comment="tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297605" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611725" comment="tensorflow2-lite-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297606" comment="tensorflow2-lite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611726" comment="tensorflow2-lite-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297607" comment="tensorflow2-lite-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611727" comment="tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297608" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611728" comment="tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297609" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611729" comment="tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297610" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611730" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297611" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611731" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297612" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611732" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297613" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15229" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15229" ref_url="https://www.suse.com/security/cve/CVE-2020-15229" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1769-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00192.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html" source="SUSE-SU"/>
    <description>
    Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15229/">CVE-2020-15229</cve>
	<bugzilla href="https://bugzilla.suse.com/1177901">SUSE bug 1177901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611733" comment="singularity-3.6.4-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15238</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15238" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15238" ref_url="https://www.suse.com/security/cve/CVE-2020-15238" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76TEVIDBCJFLHPLRZ5MVJSBDA4ETTWSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRBKJO47KUXI63HQ5CAXONKVOHGJMORZ/" source="SUSE-SU"/>
    <description>
    Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower than 2.0.6, any local user can possibly exploit this. If Polkit-1 is enabled for version 2.0.6 and later, a possible attacker needs to be allowed to use the `org.blueman.dhcp.client` action. That is limited to users in the wheel group in the shipped rules file that do have the privileges anyway. On systems with ISC DHCP client (dhclient), attackers can pass arguments to `ip link` with the interface name that can e.g. be used to bring down an interface or add an arbitrary XDP/BPF program. On systems with dhcpcd and without ISC DHCP client, attackers can even run arbitrary scripts by passing `-c/path/to/script` as an interface name. Patches are included in 2.1.4 and master that change the DhcpClient D-Bus method(s) to accept BlueZ network object paths instead of network interface names. A backport to 2.0(.8) is also available. As a workaround, make sure that Polkit-1-support is enabled and limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15238/">CVE-2020-15238</cve>
	<bugzilla href="https://bugzilla.suse.com/1178196">SUSE bug 1178196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615732" comment="blueman-2.1.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299760" comment="blueman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615733" comment="blueman-lang-2.1.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299761" comment="blueman-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615734" comment="thunar-sendto-blueman-2.1.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299762" comment="thunar-sendto-blueman is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15257</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15257" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
    <description>
    containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade. If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the "host" network namespace, for example with docker run --net=host or hostNetwork: true in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue. If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to deny unix addr=@**, to your policy. It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257</cve>
	<bugzilla href="https://bugzilla.suse.com/1178969">SUSE bug 1178969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613139" comment="containerd-1.3.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613140" comment="containerd-ctr-1.3.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613141" comment="docker-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613142" comment="docker-bash-completion-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613143" comment="docker-fish-completion-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613144" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613145" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613146" comment="docker-test-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613147" comment="docker-zsh-completion-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613148" comment="fish-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343481" comment="fish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613149" comment="fish-devel-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343482" comment="fish-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613150" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15275" ref_url="https://www.suse.com/security/cve/CVE-2020-15275" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWQ3H4AUJA2F3ISKMWL6QTCZID5AYFKR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMUGPIPMLTP6KSHV2XRIESFS7OGOBXW6/" source="SUSE-SU"/>
    <description>
    MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15275/">CVE-2020-15275</cve>
	<bugzilla href="https://bugzilla.suse.com/1178745">SUSE bug 1178745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612055" comment="moinmoin-wiki-1.9.11-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237153" comment="moinmoin-wiki is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15304</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15304" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609992" comment="libIlmImf-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609993" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609994" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609995" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609996" comment="openexr-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609997" comment="openexr-devel-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609998" comment="openexr-doc-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609992" comment="libIlmImf-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609993" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609994" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609995" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609996" comment="openexr-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609997" comment="openexr-devel-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609998" comment="openexr-doc-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15306</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15306" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609992" comment="libIlmImf-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609993" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609994" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609995" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609996" comment="openexr-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609997" comment="openexr-devel-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609998" comment="openexr-doc-2.2.1-lp152.7.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610129" comment="kernel-debug-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610130" comment="kernel-debug-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610131" comment="kernel-default-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610132" comment="kernel-default-base-5.3.18-lp152.33.1.lp152.8.4.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610133" comment="kernel-default-base-rebuild-5.3.18-lp152.33.1.lp152.8.4.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610134" comment="kernel-default-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610135" comment="kernel-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610136" comment="kernel-docs-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610137" comment="kernel-docs-html-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610138" comment="kernel-kvmsmall-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610139" comment="kernel-kvmsmall-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610140" comment="kernel-macros-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610141" comment="kernel-obs-build-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610142" comment="kernel-obs-qa-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610143" comment="kernel-preempt-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610144" comment="kernel-preempt-devel-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610145" comment="kernel-source-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610146" comment="kernel-source-vanilla-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610147" comment="kernel-syms-5.3.18-lp152.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15395" ref_url="https://www.suse.com/security/cve/CVE-2020-15395" source="SUSE CVE"/>
    <description>
    In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka an off-by-one during MpegPs parsing).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15395/">CVE-2020-15395</cve>
	<bugzilla href="https://bugzilla.suse.com/1173630">SUSE bug 1173630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611038" comment="kf5-mediainfo-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293412" comment="kf5-mediainfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611039" comment="libmediainfo-devel-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258260" comment="libmediainfo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611040" comment="libmediainfo0-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258262" comment="libmediainfo0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611041" comment="libmediainfo0-32bit-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258264" comment="libmediainfo0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611042" comment="mediainfo-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293413" comment="mediainfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611043" comment="mediainfo-gui-20.08-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293414" comment="mediainfo-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15396" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15396" ref_url="https://www.suse.com/security/cve/CVE-2020-15396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html" source="SUSE-SU"/>
    <description>
    In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15396/">CVE-2020-15396</cve>
	<bugzilla href="https://bugzilla.suse.com/1173521">SUSE bug 1173521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610361" comment="hylafax+-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610362" comment="hylafax+-client-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610363" comment="libfaxutil7_0_3-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15397" ref_url="https://www.suse.com/security/cve/CVE-2020-15397" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html" source="SUSE-SU"/>
    <description>
    HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15397/">CVE-2020-15397</cve>
	<bugzilla href="https://bugzilla.suse.com/1173519">SUSE bug 1173519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610361" comment="hylafax+-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610362" comment="hylafax+-client-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610363" comment="libfaxutil7_0_3-7.0.3-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15436</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15437</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466</cve>
	<bugzilla href="https://bugzilla.suse.com/1173606">SUSE bug 1173606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610346" comment="libwireshark13-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610347" comment="libwiretap10-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610348" comment="libwsutil11-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610349" comment="wireshark-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610350" comment="wireshark-devel-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610351" comment="wireshark-ui-qt-3.2.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15469</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007173.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html" source="SUSE-SU"/>
    <description>
    LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503</cve>
	<bugzilla href="https://bugzilla.suse.com/1173674">SUSE bug 1173674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610209" comment="libraw-devel-0.18.9-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151901" comment="libraw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610210" comment="libraw-devel-static-0.18.9-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153172" comment="libraw-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610211" comment="libraw-tools-0.18.9-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153173" comment="libraw-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610212" comment="libraw16-0.18.9-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177187" comment="libraw16 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSUJOEQHX6WIC7O7EQMIAET7L3ZTQKGM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2163-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XW6YD6VRTKZILPJP3QZQB6MFPZKOQLU6/" source="SUSE-SU"/>
    <description>
    Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522</cve>
	<bugzilla href="https://bugzilla.suse.com/1186328">SUSE bug 1186328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616459" comment="bouncycastle-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153068" comment="bouncycastle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616460" comment="bouncycastle-javadoc-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153069" comment="bouncycastle-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616461" comment="bouncycastle-mail-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009616465" comment="bouncycastle-mail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616462" comment="bouncycastle-pg-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009616466" comment="bouncycastle-pg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616463" comment="bouncycastle-pkix-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009616467" comment="bouncycastle-pkix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009616464" comment="bouncycastle-tls-1.64-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009616468" comment="bouncycastle-tls is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15562" ref_url="https://www.suse.com/security/cve/CVE-2020-15562" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15562/">CVE-2020-15562</cve>
	<bugzilla href="https://bugzilla.suse.com/1173792">SUSE bug 1173792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15563" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563</cve>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612819" comment="xen-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612820" comment="xen-devel-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612821" comment="xen-doc-html-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612822" comment="xen-libs-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612823" comment="xen-libs-32bit-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612824" comment="xen-tools-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612825" comment="xen-tools-domU-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612826" comment="xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612819" comment="xen-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612820" comment="xen-devel-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612821" comment="xen-doc-html-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612822" comment="xen-libs-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612823" comment="xen-libs-32bit-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612824" comment="xen-tools-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612825" comment="xen-tools-domU-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612826" comment="xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566</cve>
	<bugzilla href="https://bugzilla.suse.com/1173376">SUSE bug 1173376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612819" comment="xen-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612820" comment="xen-devel-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612821" comment="xen-doc-html-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612822" comment="xen-libs-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612823" comment="xen-libs-32bit-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612824" comment="xen-tools-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612825" comment="xen-tools-domU-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612826" comment="xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612819" comment="xen-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612820" comment="xen-devel-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612821" comment="xen-doc-html-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612822" comment="xen-libs-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612823" comment="xen-libs-32bit-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612824" comment="xen-tools-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612825" comment="xen-tools-domU-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612826" comment="xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15572</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15572" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15572" ref_url="https://www.suse.com/security/cve/CVE-2020-15572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15572/">CVE-2020-15572</cve>
	<bugzilla href="https://bugzilla.suse.com/1173979">SUSE bug 1173979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615257" comment="tor-0.4.4.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15586</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586</cve>
	<bugzilla href="https://bugzilla.suse.com/1174153">SUSE bug 1174153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610161" comment="go1.13-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610162" comment="go1.13-doc-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610163" comment="go1.13-race-1.13.14-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611053" comment="go1.14-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611054" comment="go1.14-doc-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611055" comment="go1.14-race-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610357" comment="MozillaThunderbird-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610358" comment="MozillaThunderbird-translations-common-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610359" comment="MozillaThunderbird-translations-other-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15657</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15658</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610357" comment="MozillaThunderbird-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610358" comment="MozillaThunderbird-translations-common-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610359" comment="MozillaThunderbird-translations-other-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, and Firefox ESR &lt; 78.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611044" comment="MozillaFirefox-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611045" comment="MozillaFirefox-branding-upstream-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611046" comment="MozillaFirefox-buildsymbols-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611047" comment="MozillaFirefox-devel-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611048" comment="MozillaFirefox-translations-common-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611049" comment="MozillaFirefox-translations-other-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611050" comment="MozillaThunderbird-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611051" comment="MozillaThunderbird-translations-common-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611052" comment="MozillaThunderbird-translations-other-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, Firefox ESR &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611044" comment="MozillaFirefox-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611045" comment="MozillaFirefox-branding-upstream-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611046" comment="MozillaFirefox-buildsymbols-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611047" comment="MozillaFirefox-devel-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611048" comment="MozillaFirefox-translations-common-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611049" comment="MozillaFirefox-translations-other-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611050" comment="MozillaThunderbird-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611051" comment="MozillaThunderbird-translations-common-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611052" comment="MozillaThunderbird-translations-other-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.12 and Thunderbird &lt; 68.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611050" comment="MozillaThunderbird-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611051" comment="MozillaThunderbird-translations-common-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611052" comment="MozillaThunderbird-translations-other-68.12.0-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox for Android 79. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 80, Firefox ESR &lt; 78.2, Thunderbird &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611044" comment="MozillaFirefox-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611045" comment="MozillaFirefox-branding-upstream-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611046" comment="MozillaFirefox-buildsymbols-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611047" comment="MozillaFirefox-devel-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611048" comment="MozillaFirefox-translations-common-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611049" comment="MozillaFirefox-translations-other-78.2.0-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611389" comment="MozillaFirefox-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611390" comment="MozillaFirefox-branding-upstream-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611391" comment="MozillaFirefox-buildsymbols-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611392" comment="MozillaFirefox-devel-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611393" comment="MozillaFirefox-translations-common-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611394" comment="MozillaFirefox-translations-other-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611389" comment="MozillaFirefox-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611390" comment="MozillaFirefox-branding-upstream-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611391" comment="MozillaFirefox-buildsymbols-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611392" comment="MozillaFirefox-devel-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611393" comment="MozillaFirefox-translations-common-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611394" comment="MozillaFirefox-translations-other-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611389" comment="MozillaFirefox-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611390" comment="MozillaFirefox-branding-upstream-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611391" comment="MozillaFirefox-buildsymbols-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611392" comment="MozillaFirefox-devel-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611393" comment="MozillaFirefox-translations-common-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611394" comment="MozillaFirefox-translations-other-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611389" comment="MozillaFirefox-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611390" comment="MozillaFirefox-branding-upstream-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611391" comment="MozillaFirefox-buildsymbols-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611392" comment="MozillaFirefox-devel-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611393" comment="MozillaFirefox-translations-common-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611394" comment="MozillaFirefox-translations-other-78.3.0-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.4, Firefox &lt; 82, and Thunderbird &lt; 78.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611705" comment="MozillaFirefox-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611706" comment="MozillaFirefox-branding-upstream-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611707" comment="MozillaFirefox-buildsymbols-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611708" comment="MozillaFirefox-devel-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611709" comment="MozillaFirefox-translations-common-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611710" comment="MozillaFirefox-translations-other-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" source="SUSE-SU"/>
    <description>
    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182890">SUSE bug 1182890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610724" comment="grub2-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610725" comment="grub2-branding-upstream-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610726" comment="grub2-i386-efi-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610727" comment="grub2-i386-efi-debug-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610728" comment="grub2-i386-pc-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610729" comment="grub2-i386-pc-debug-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610730" comment="grub2-i386-xen-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610731" comment="grub2-snapper-plugin-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610732" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610733" comment="grub2-x86_64-efi-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610734" comment="grub2-x86_64-efi-debug-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610735" comment="grub2-x86_64-xen-2.04-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15706</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610290" comment="grub2-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610291" comment="grub2-branding-upstream-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610292" comment="grub2-i386-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610293" comment="grub2-i386-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610294" comment="grub2-i386-pc-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610295" comment="grub2-i386-pc-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610296" comment="grub2-i386-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610297" comment="grub2-snapper-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610298" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610299" comment="grub2-x86_64-efi-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610300" comment="grub2-x86_64-efi-debug-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610301" comment="grub2-x86_64-xen-2.04-lp152.7.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611735" comment="libvirt-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611736" comment="libvirt-admin-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611737" comment="libvirt-bash-completion-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611738" comment="libvirt-client-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611739" comment="libvirt-daemon-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611740" comment="libvirt-daemon-config-network-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611741" comment="libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611742" comment="libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611743" comment="libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611744" comment="libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611745" comment="libvirt-daemon-driver-network-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611746" comment="libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611747" comment="libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611748" comment="libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611749" comment="libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611750" comment="libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611751" comment="libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611752" comment="libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611753" comment="libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611754" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611755" comment="libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611756" comment="libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611757" comment="libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611758" comment="libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611759" comment="libvirt-daemon-hooks-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611760" comment="libvirt-daemon-lxc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611761" comment="libvirt-daemon-qemu-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611762" comment="libvirt-daemon-xen-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611763" comment="libvirt-devel-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611764" comment="libvirt-devel-32bit-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611765" comment="libvirt-doc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611766" comment="libvirt-libs-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611767" comment="libvirt-lock-sanlock-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611768" comment="libvirt-nss-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611769" comment="wireshark-plugin-libvirt-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15719" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" source="SUSE-SU"/>
    <description>
    libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611105" comment="libldap-2_4-2-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611106" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611107" comment="libldap-data-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611108" comment="openldap2-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611109" comment="openldap2-back-meta-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611110" comment="openldap2-back-perl-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611111" comment="openldap2-back-sock-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611112" comment="openldap2-back-sql-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611113" comment="openldap2-client-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611114" comment="openldap2-contrib-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611115" comment="openldap2-devel-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611116" comment="openldap2-devel-32bit-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611117" comment="openldap2-devel-static-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611118" comment="openldap2-doc-2.4.46-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611119" comment="openldap2-ppolicy-check-password-1.2-lp152.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15780</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174186">SUSE bug 1174186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTUQBSMWYBVSTVDYNNRW5EOI5CCOSTPZ/" source="SUSE-SU"/>
    <description>
    Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803</cve>
	<bugzilla href="https://bugzilla.suse.com/1174253">SUSE bug 1174253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615263" comment="zabbix-agent-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294885" comment="zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615264" comment="zabbix-bash-completion-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294887" comment="zabbix-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615265" comment="zabbix-java-gateway-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294889" comment="zabbix-java-gateway is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615266" comment="zabbix-phpfrontend-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294891" comment="zabbix-phpfrontend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615267" comment="zabbix-proxy-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294893" comment="zabbix-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615268" comment="zabbix-proxy-mysql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294895" comment="zabbix-proxy-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615269" comment="zabbix-proxy-postgresql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294897" comment="zabbix-proxy-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615270" comment="zabbix-proxy-sqlite-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294899" comment="zabbix-proxy-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615271" comment="zabbix-server-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294901" comment="zabbix-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615272" comment="zabbix-server-mysql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294903" comment="zabbix-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615273" comment="zabbix-server-postgresql-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294905" comment="zabbix-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615274" comment="zabbix-server-sqlite-3.0.31-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294907" comment="zabbix-server-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810" source="SUSE CVE"/>
		<reference ref_id="GHSA-3365-q9qx-f98m" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-3365-q9qx-f98m" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611006" comment="squid-4.13-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811" source="SUSE CVE"/>
		<reference ref_id="GHSA-c7p8-xqhm-49wv" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c7p8-xqhm-49wv" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611006" comment="squid-4.13-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611452" comment="qemu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611453" comment="qemu-arm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611454" comment="qemu-audio-alsa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611455" comment="qemu-audio-pa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611456" comment="qemu-audio-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611457" comment="qemu-block-curl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611458" comment="qemu-block-dmg-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611459" comment="qemu-block-gluster-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611460" comment="qemu-block-iscsi-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611461" comment="qemu-block-nfs-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611462" comment="qemu-block-rbd-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611463" comment="qemu-block-ssh-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611464" comment="qemu-extra-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611465" comment="qemu-guest-agent-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611466" comment="qemu-ipxe-1.0.0+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611467" comment="qemu-ksm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611468" comment="qemu-kvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611469" comment="qemu-lang-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611470" comment="qemu-linux-user-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611471" comment="qemu-microvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611472" comment="qemu-ppc-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611473" comment="qemu-s390-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611474" comment="qemu-seabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611475" comment="qemu-sgabios-8-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611476" comment="qemu-testsuite-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611477" comment="qemu-tools-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611478" comment="qemu-ui-curses-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611479" comment="qemu-ui-gtk-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611480" comment="qemu-ui-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611481" comment="qemu-ui-spice-app-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611482" comment="qemu-vgabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611483" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611484" comment="qemu-x86-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610219" comment="ghostscript-9.52-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610220" comment="ghostscript-devel-9.52-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610221" comment="ghostscript-mini-9.52-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610222" comment="ghostscript-mini-devel-9.52-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610223" comment="ghostscript-x11-9.52-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15917" ref_url="https://www.suse.com/security/cve/CVE-2020-15917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VE6WDEXX6HETWFB6EGOWAEY6QQSAI6E/" source="SUSE-SU"/>
    <description>
    common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15917/">CVE-2020-15917</cve>
	<bugzilla href="https://bugzilla.suse.com/1174457">SUSE bug 1174457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625249" comment="claws-mail-3.18.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151767" comment="claws-mail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625250" comment="claws-mail-devel-3.18.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153189" comment="claws-mail-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625251" comment="claws-mail-lang-3.18.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151768" comment="claws-mail-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15953" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15953" ref_url="https://www.suse.com/security/cve/CVE-2020-15953" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1454-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1505-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00219.html" source="SUSE-SU"/>
    <description>
    LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15953/">CVE-2020-15953</cve>
	<bugzilla href="https://bugzilla.suse.com/1174579">SUSE bug 1174579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611056" comment="libetpan-devel-1.9.4-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169764" comment="libetpan-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611057" comment="libetpan20-1.9.4-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293415" comment="libetpan20 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15959" ref_url="https://www.suse.com/security/cve/CVE-2020-15959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15959/">CVE-2020-15959</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15960" ref_url="https://www.suse.com/security/cve/CVE-2020-15960" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15960/">CVE-2020-15960</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15961" ref_url="https://www.suse.com/security/cve/CVE-2020-15961" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15961/">CVE-2020-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15962" ref_url="https://www.suse.com/security/cve/CVE-2020-15962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15962/">CVE-2020-15962</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15963</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15963" ref_url="https://www.suse.com/security/cve/CVE-2020-15963" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15963/">CVE-2020-15963</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15964" ref_url="https://www.suse.com/security/cve/CVE-2020-15964" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15964/">CVE-2020-15964</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15965" ref_url="https://www.suse.com/security/cve/CVE-2020-15965" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15965/">CVE-2020-15965</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15966" ref_url="https://www.suse.com/security/cve/CVE-2020-15966" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15966/">CVE-2020-15966</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605397" comment="chromedriver-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605398" comment="chromium-85.0.4183.121-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15967" ref_url="https://www.suse.com/security/cve/CVE-2020-15967" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15967/">CVE-2020-15967</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15968" ref_url="https://www.suse.com/security/cve/CVE-2020-15968" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15968/">CVE-2020-15968</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15969</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611705" comment="MozillaFirefox-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611706" comment="MozillaFirefox-branding-upstream-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611707" comment="MozillaFirefox-buildsymbols-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611708" comment="MozillaFirefox-devel-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611709" comment="MozillaFirefox-translations-common-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611710" comment="MozillaFirefox-translations-other-78.4.0-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611770" comment="MozillaThunderbird-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611771" comment="MozillaThunderbird-translations-common-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611772" comment="MozillaThunderbird-translations-other-78.4.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611773" comment="mozilla-nspr-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611774" comment="mozilla-nspr-32bit-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611775" comment="mozilla-nspr-devel-4.25.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15970</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15970" ref_url="https://www.suse.com/security/cve/CVE-2020-15970" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15970/">CVE-2020-15970</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15971" ref_url="https://www.suse.com/security/cve/CVE-2020-15971" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15971/">CVE-2020-15971</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15972" ref_url="https://www.suse.com/security/cve/CVE-2020-15972" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15972/">CVE-2020-15972</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15973" ref_url="https://www.suse.com/security/cve/CVE-2020-15973" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15973/">CVE-2020-15973</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15974" ref_url="https://www.suse.com/security/cve/CVE-2020-15974" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15974/">CVE-2020-15974</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15975</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15975" ref_url="https://www.suse.com/security/cve/CVE-2020-15975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15975/">CVE-2020-15975</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15976" ref_url="https://www.suse.com/security/cve/CVE-2020-15976" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15976/">CVE-2020-15976</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15977" ref_url="https://www.suse.com/security/cve/CVE-2020-15977" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15977/">CVE-2020-15977</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15978" ref_url="https://www.suse.com/security/cve/CVE-2020-15978" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15978/">CVE-2020-15978</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15979</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15979" ref_url="https://www.suse.com/security/cve/CVE-2020-15979" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15979/">CVE-2020-15979</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15980" ref_url="https://www.suse.com/security/cve/CVE-2020-15980" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15980/">CVE-2020-15980</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15981" ref_url="https://www.suse.com/security/cve/CVE-2020-15981" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15981/">CVE-2020-15981</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15982</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15982" ref_url="https://www.suse.com/security/cve/CVE-2020-15982" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15982/">CVE-2020-15982</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15983" ref_url="https://www.suse.com/security/cve/CVE-2020-15983" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15983/">CVE-2020-15983</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15984" ref_url="https://www.suse.com/security/cve/CVE-2020-15984" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15984/">CVE-2020-15984</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15985</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15985" ref_url="https://www.suse.com/security/cve/CVE-2020-15985" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15985/">CVE-2020-15985</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15986</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15986" ref_url="https://www.suse.com/security/cve/CVE-2020-15986" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15986/">CVE-2020-15986</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15987" ref_url="https://www.suse.com/security/cve/CVE-2020-15987" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15987/">CVE-2020-15987</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15988" ref_url="https://www.suse.com/security/cve/CVE-2020-15988" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15988/">CVE-2020-15988</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15989</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15989" ref_url="https://www.suse.com/security/cve/CVE-2020-15989" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15989/">CVE-2020-15989</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15990</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15990" ref_url="https://www.suse.com/security/cve/CVE-2020-15990" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15990/">CVE-2020-15990</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15991" ref_url="https://www.suse.com/security/cve/CVE-2020-15991" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15991/">CVE-2020-15991</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15992" ref_url="https://www.suse.com/security/cve/CVE-2020-15992" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15992/">CVE-2020-15992</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15995" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15995" ref_url="https://www.suse.com/security/cve/CVE-2020-15995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15995/">CVE-2020-15995</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611674" comment="chromedriver-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611675" comment="chromium-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611688" comment="freetype2-devel-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611689" comment="freetype2-devel-32bit-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171242" comment="freetype2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611690" comment="freetype2-profile-tti35-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283722" comment="freetype2-profile-tti35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611691" comment="ft2demos-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611692" comment="ftbench-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177150" comment="ftbench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611693" comment="ftdiff-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177151" comment="ftdiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611694" comment="ftdump-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177152" comment="ftdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611695" comment="ftgamma-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177153" comment="ftgamma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611696" comment="ftgrid-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177154" comment="ftgrid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611697" comment="ftinspect-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177155" comment="ftinspect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611698" comment="ftlint-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177156" comment="ftlint is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611699" comment="ftmulti-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177157" comment="ftmulti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611700" comment="ftstring-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177158" comment="ftstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611701" comment="ftvalid-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177159" comment="ftvalid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611702" comment="ftview-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177160" comment="ftview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611703" comment="libfreetype6-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611704" comment="libfreetype6-32bit-2.10.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16000</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16000" ref_url="https://www.suse.com/security/cve/CVE-2020-16000" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16000/">CVE-2020-16000</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611674" comment="chromedriver-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611675" comment="chromium-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16001</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16001" ref_url="https://www.suse.com/security/cve/CVE-2020-16001" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16001/">CVE-2020-16001</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611674" comment="chromedriver-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611675" comment="chromium-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16002</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16002" ref_url="https://www.suse.com/security/cve/CVE-2020-16002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16002/">CVE-2020-16002</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611674" comment="chromedriver-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611675" comment="chromium-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16003</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16003" ref_url="https://www.suse.com/security/cve/CVE-2020-16003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16003/">CVE-2020-16003</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611674" comment="chromedriver-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611675" comment="chromium-86.0.4240.111-lp152.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16004</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16004" ref_url="https://www.suse.com/security/cve/CVE-2020-16004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16004/">CVE-2020-16004</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16005</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16005" ref_url="https://www.suse.com/security/cve/CVE-2020-16005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16005/">CVE-2020-16005</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16006" ref_url="https://www.suse.com/security/cve/CVE-2020-16006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16006/">CVE-2020-16006</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16007</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16007" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16007" ref_url="https://www.suse.com/security/cve/CVE-2020-16007" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16007/">CVE-2020-16007</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16008" ref_url="https://www.suse.com/security/cve/CVE-2020-16008" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16008/">CVE-2020-16008</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16009" ref_url="https://www.suse.com/security/cve/CVE-2020-16009" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16009/">CVE-2020-16009</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16011" ref_url="https://www.suse.com/security/cve/CVE-2020-16011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16011/">CVE-2020-16011</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606173" comment="opera-72.0.3815.320-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615738" comment="chromedriver-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615739" comment="chromium-86.0.4240.183-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16013" ref_url="https://www.suse.com/security/cve/CVE-2020-16013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELOCKFRXJEKGKGO7AQH4WNPKH7IYSMSR/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16013/">CVE-2020-16013</cve>
	<bugzilla href="https://bugzilla.suse.com/1178703">SUSE bug 1178703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606639" comment="opera-72.0.3815.400-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615740" comment="chromedriver-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615741" comment="chromium-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16014</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16014" ref_url="https://www.suse.com/security/cve/CVE-2020-16014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16014/">CVE-2020-16014</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16015" ref_url="https://www.suse.com/security/cve/CVE-2020-16015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16015/">CVE-2020-16015</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16016" ref_url="https://www.suse.com/security/cve/CVE-2020-16016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16016/">CVE-2020-16016</cve>
	<bugzilla href="https://bugzilla.suse.com/1178630">SUSE bug 1178630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615740" comment="chromedriver-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615741" comment="chromium-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16017" ref_url="https://www.suse.com/security/cve/CVE-2020-16017" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELOCKFRXJEKGKGO7AQH4WNPKH7IYSMSR/" source="SUSE-SU"/>
    <description>
    Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16017/">CVE-2020-16017</cve>
	<bugzilla href="https://bugzilla.suse.com/1178703">SUSE bug 1178703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606639" comment="opera-72.0.3815.400-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615740" comment="chromedriver-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615741" comment="chromium-86.0.4240.198-lp152.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16018" ref_url="https://www.suse.com/security/cve/CVE-2020-16018" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16018/">CVE-2020-16018</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16019" ref_url="https://www.suse.com/security/cve/CVE-2020-16019" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in filesystem in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16019/">CVE-2020-16019</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16020" ref_url="https://www.suse.com/security/cve/CVE-2020-16020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cryptohome in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass discretionary access control via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16020/">CVE-2020-16020</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16021" ref_url="https://www.suse.com/security/cve/CVE-2020-16021" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to perform OS-level privilege escalation via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16021/">CVE-2020-16021</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16022" ref_url="https://www.suse.com/security/cve/CVE-2020-16022" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16022/">CVE-2020-16022</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16023" ref_url="https://www.suse.com/security/cve/CVE-2020-16023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in WebCodecs in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16023/">CVE-2020-16023</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16024" ref_url="https://www.suse.com/security/cve/CVE-2020-16024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16024/">CVE-2020-16024</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16025</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16025" ref_url="https://www.suse.com/security/cve/CVE-2020-16025" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16025/">CVE-2020-16025</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16026" ref_url="https://www.suse.com/security/cve/CVE-2020-16026" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16026/">CVE-2020-16026</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16027</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16027" ref_url="https://www.suse.com/security/cve/CVE-2020-16027" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 87.0.4280.66 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from the user's disk via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16027/">CVE-2020-16027</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16028</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16028" ref_url="https://www.suse.com/security/cve/CVE-2020-16028" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16028/">CVE-2020-16028</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16029</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16029" ref_url="https://www.suse.com/security/cve/CVE-2020-16029" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in PDFium in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16029/">CVE-2020-16029</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16030" ref_url="https://www.suse.com/security/cve/CVE-2020-16030" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Blink in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16030/">CVE-2020-16030</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16031</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16031" ref_url="https://www.suse.com/security/cve/CVE-2020-16031" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16031/">CVE-2020-16031</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16032" ref_url="https://www.suse.com/security/cve/CVE-2020-16032" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in sharing in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16032/">CVE-2020-16032</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16033</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16033" ref_url="https://www.suse.com/security/cve/CVE-2020-16033" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebUSB in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16033/">CVE-2020-16033</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16034" ref_url="https://www.suse.com/security/cve/CVE-2020-16034" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a local attacker to bypass policy restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16034/">CVE-2020-16034</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16035</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16035" ref_url="https://www.suse.com/security/cve/CVE-2020-16035" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in cros-disks in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16035/">CVE-2020-16035</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16036</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16036" ref_url="https://www.suse.com/security/cve/CVE-2020-16036" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cookies in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass cookie restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16036/">CVE-2020-16036</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612124" comment="chromedriver-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612125" comment="chromium-87.0.4280.66-lp152.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16037" ref_url="https://www.suse.com/security/cve/CVE-2020-16037" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in clipboard in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16037/">CVE-2020-16037</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16038" ref_url="https://www.suse.com/security/cve/CVE-2020-16038" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16038/">CVE-2020-16038</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16039" ref_url="https://www.suse.com/security/cve/CVE-2020-16039" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16039/">CVE-2020-16039</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16040" ref_url="https://www.suse.com/security/cve/CVE-2020-16040" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16040/">CVE-2020-16040</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16041" ref_url="https://www.suse.com/security/cve/CVE-2020-16041" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Out of bounds read in networking in Google Chrome prior to 87.0.4280.88 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16041/">CVE-2020-16041</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16042</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612627" comment="opera-73.0.3856.284-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612398" comment="chromedriver-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612399" comment="chromium-87.0.4280.88-lp152.2.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16043" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16043" ref_url="https://www.suse.com/security/cve/CVE-2020-16043" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16043/">CVE-2020-16043</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16044</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWW23OVUF57OUUNFOOBPRID66YRCNBPH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R64OG7KLB7DVCRVNOYE46AZ266XQ2F23/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PBD5PFZIW6WZ7R65QRFVISRDWYC6WO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3236IRHAJFLO3NB3KMMBI5XYZOZFL6S7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614172" comment="MozillaFirefox-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614173" comment="MozillaFirefox-branding-upstream-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614174" comment="MozillaFirefox-buildsymbols-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614175" comment="MozillaFirefox-devel-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614176" comment="MozillaFirefox-translations-common-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614177" comment="MozillaFirefox-translations-other-78.6.1-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615221" comment="MozillaThunderbird-78.6.1-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615222" comment="MozillaThunderbird-translations-common-78.6.1-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615223" comment="MozillaThunderbird-translations-other-78.6.1-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611452" comment="qemu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611453" comment="qemu-arm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611454" comment="qemu-audio-alsa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611455" comment="qemu-audio-pa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611456" comment="qemu-audio-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611457" comment="qemu-block-curl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611458" comment="qemu-block-dmg-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611459" comment="qemu-block-gluster-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611460" comment="qemu-block-iscsi-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611461" comment="qemu-block-nfs-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611462" comment="qemu-block-rbd-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611463" comment="qemu-block-ssh-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611464" comment="qemu-extra-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611465" comment="qemu-guest-agent-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611466" comment="qemu-ipxe-1.0.0+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611467" comment="qemu-ksm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611468" comment="qemu-kvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611469" comment="qemu-lang-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611470" comment="qemu-linux-user-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611471" comment="qemu-microvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611472" comment="qemu-ppc-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611473" comment="qemu-s390-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611474" comment="qemu-seabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611475" comment="qemu-sgabios-8-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611476" comment="qemu-testsuite-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611477" comment="qemu-tools-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611478" comment="qemu-ui-curses-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611479" comment="qemu-ui-gtk-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611480" comment="qemu-ui-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611481" comment="qemu-ui-spice-app-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611482" comment="qemu-vgabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611483" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611484" comment="qemu-x86-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16116" ref_url="https://www.suse.com/security/cve/CVE-2020-16116" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00045.html" source="SUSE-SU"/>
    <description>
    In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16116/">CVE-2020-16116</cve>
	<bugzilla href="https://bugzilla.suse.com/1174773">SUSE bug 1174773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615742" comment="ark-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154016" comment="ark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615743" comment="ark-lang-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289271" comment="ark-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609882" comment="libkerfuffle18-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289272" comment="libkerfuffle18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009511912" comment="libkerfuffle20-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291475" comment="libkerfuffle20 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16117" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16117" ref_url="https://www.suse.com/security/cve/CVE-2020-16117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3CUVYOHJVMCTZXIKRZXRNXLROM7HCFQ/" source="SUSE-SU"/>
    <description>
    In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16117/">CVE-2020-16117</cve>
	<bugzilla href="https://bugzilla.suse.com/1174712">SUSE bug 1174712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613876" comment="evolution-data-server-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348193" comment="evolution-data-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613877" comment="evolution-data-server-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348194" comment="evolution-data-server-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613878" comment="evolution-data-server-devel-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348195" comment="evolution-data-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613879" comment="evolution-data-server-lang-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348196" comment="evolution-data-server-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613880" comment="evolution-ews-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348197" comment="evolution-ews is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613881" comment="evolution-ews-lang-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348198" comment="evolution-ews-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613882" comment="libcamel-1_2-62-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348199" comment="libcamel-1_2-62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613883" comment="libcamel-1_2-62-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348200" comment="libcamel-1_2-62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613884" comment="libebackend-1_2-10-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348201" comment="libebackend-1_2-10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613885" comment="libebackend-1_2-10-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348202" comment="libebackend-1_2-10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613886" comment="libebook-1_2-20-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348203" comment="libebook-1_2-20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613887" comment="libebook-1_2-20-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348204" comment="libebook-1_2-20-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613888" comment="libebook-contacts-1_2-3-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348205" comment="libebook-contacts-1_2-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613889" comment="libebook-contacts-1_2-3-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348206" comment="libebook-contacts-1_2-3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613890" comment="libecal-2_0-1-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348207" comment="libecal-2_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613891" comment="libecal-2_0-1-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348208" comment="libecal-2_0-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613892" comment="libedata-book-1_2-26-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348209" comment="libedata-book-1_2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613893" comment="libedata-book-1_2-26-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348210" comment="libedata-book-1_2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613894" comment="libedata-cal-2_0-1-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348211" comment="libedata-cal-2_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613895" comment="libedata-cal-2_0-1-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348212" comment="libedata-cal-2_0-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613896" comment="libedataserver-1_2-24-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348213" comment="libedataserver-1_2-24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613897" comment="libedataserver-1_2-24-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348214" comment="libedataserver-1_2-24-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613898" comment="libedataserverui-1_2-2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348215" comment="libedataserverui-1_2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613899" comment="libedataserverui-1_2-2-32bit-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348216" comment="libedataserverui-1_2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613900" comment="typelib-1_0-Camel-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348217" comment="typelib-1_0-Camel-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613901" comment="typelib-1_0-EBackend-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348218" comment="typelib-1_0-EBackend-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613902" comment="typelib-1_0-EBook-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348219" comment="typelib-1_0-EBook-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613903" comment="typelib-1_0-EBookContacts-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348220" comment="typelib-1_0-EBookContacts-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613904" comment="typelib-1_0-ECal-2_0-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348221" comment="typelib-1_0-ECal-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613905" comment="typelib-1_0-EDataBook-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348222" comment="typelib-1_0-EDataBook-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613906" comment="typelib-1_0-EDataCal-2_0-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348223" comment="typelib-1_0-EDataCal-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613907" comment="typelib-1_0-EDataServer-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348224" comment="typelib-1_0-EDataServer-1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613908" comment="typelib-1_0-EDataServerUI-1_2-3.34.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348225" comment="typelib-1_0-EDataServerUI-1_2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16120</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16121</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16121" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMDG3TCU5LRAC7S5OQFWQ2ZCJ6MQPUSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZ7V5X4VPZ6MTETS6GU4AOZBIWDADE3U/" source="SUSE-SU"/>
    <description>
    PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121</cve>
	<bugzilla href="https://bugzilla.suse.com/1176930">SUSE bug 1176930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612599" comment="PackageKit-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174862" comment="PackageKit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612600" comment="PackageKit-backend-dnf-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340520" comment="PackageKit-backend-dnf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612601" comment="PackageKit-backend-zypp-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174863" comment="PackageKit-backend-zypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612602" comment="PackageKit-branding-upstream-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174864" comment="PackageKit-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612603" comment="PackageKit-devel-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174865" comment="PackageKit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612604" comment="PackageKit-gstreamer-plugin-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174866" comment="PackageKit-gstreamer-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612605" comment="PackageKit-gtk3-module-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174867" comment="PackageKit-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612606" comment="PackageKit-lang-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174868" comment="PackageKit-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612607" comment="libpackagekit-glib2-18-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174869" comment="libpackagekit-glib2-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612608" comment="libpackagekit-glib2-18-32bit-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174870" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612609" comment="libpackagekit-glib2-devel-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174871" comment="libpackagekit-glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612610" comment="libpackagekit-glib2-devel-32bit-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174872" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612611" comment="typelib-1_0-PackageKitGlib-1_0-1.1.13-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174873" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZX3UTGQD6BVLNXN2RQDQJAGIEKRWA7A4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSCPFN6UQDWHTSA3DT4W6QWNTQE4X4HE/" source="SUSE-SU"/>
    <description>
    gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<bugzilla href="https://bugzilla.suse.com/1140851">SUSE bug 1140851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612045" comment="gdm-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151581" comment="gdm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612046" comment="gdm-branding-upstream-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235241" comment="gdm-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612047" comment="gdm-devel-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235242" comment="gdm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612048" comment="gdm-lang-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151582" comment="gdm-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612049" comment="gdm-systemd-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299571" comment="gdm-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612050" comment="gdmflexiserver-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151583" comment="gdmflexiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612051" comment="libgdm1-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151584" comment="libgdm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612052" comment="typelib-1_0-Gdm-1_0-3.34.1-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151585" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16145" ref_url="https://www.suse.com/security/cve/CVE-2020-16145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16145/">CVE-2020-16145</cve>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615255" comment="roundcubemail-1.3.15-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610419" comment="bbswitch-0.8-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173348" comment="bbswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610420" comment="bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173349" comment="bbswitch-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610421" comment="bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291403" comment="bbswitch-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610422" comment="crash-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173350" comment="crash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610423" comment="crash-devel-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173351" comment="crash-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610424" comment="crash-doc-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173352" comment="crash-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610425" comment="crash-eppic-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173353" comment="crash-eppic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610426" comment="crash-gcore-7.2.8-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173354" comment="crash-gcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610427" comment="crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610428" comment="crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291404" comment="crash-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610429" comment="dpdk-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610430" comment="dpdk-devel-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610431" comment="dpdk-doc-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610432" comment="dpdk-examples-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610433" comment="dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610434" comment="dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291405" comment="dpdk-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610435" comment="dpdk-tools-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610436" comment="drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610437" comment="drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610438" comment="drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291406" comment="drbd-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610439" comment="hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610440" comment="hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291407" comment="hdjmod-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610441" comment="kernel-debug-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610442" comment="kernel-debug-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610443" comment="kernel-default-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610444" comment="kernel-default-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610445" comment="kernel-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610446" comment="kernel-docs-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610447" comment="kernel-docs-html-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610448" comment="kernel-kvmsmall-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610449" comment="kernel-kvmsmall-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610450" comment="kernel-macros-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610451" comment="kernel-obs-build-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610452" comment="kernel-obs-qa-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610453" comment="kernel-preempt-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610454" comment="kernel-preempt-devel-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610455" comment="kernel-source-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610456" comment="kernel-source-vanilla-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610457" comment="kernel-syms-5.3.18-lp152.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610458" comment="libdpdk-20_0-19.11.1-lp152.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291408" comment="libdpdk-20_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610459" comment="mhvtl-1.62-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291409" comment="mhvtl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610460" comment="mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291410" comment="mhvtl-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610461" comment="mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291411" comment="mhvtl-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610462" comment="openafs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291412" comment="openafs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610463" comment="openafs-authlibs-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291413" comment="openafs-authlibs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610464" comment="openafs-authlibs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291414" comment="openafs-authlibs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610465" comment="openafs-client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291415" comment="openafs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610466" comment="openafs-devel-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291416" comment="openafs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610467" comment="openafs-fuse_client-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291417" comment="openafs-fuse_client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610468" comment="openafs-kernel-source-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291418" comment="openafs-kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610469" comment="openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291419" comment="openafs-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610470" comment="openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291420" comment="openafs-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610471" comment="openafs-server-1.8.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291421" comment="openafs-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610472" comment="pcfclock-0.44-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610473" comment="pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610474" comment="pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291422" comment="pcfclock-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610475" comment="python3-virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610476" comment="rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291423" comment="rtl8812au is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610477" comment="rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291424" comment="rtl8812au-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610478" comment="rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291425" comment="rtl8812au-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610479" comment="sysdig-0.26.5-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173367" comment="sysdig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610480" comment="sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173368" comment="sysdig-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610481" comment="sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291426" comment="sysdig-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610482" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291428" comment="v4l2loopback-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610483" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291429" comment="v4l2loopback-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610484" comment="v4l2loopback-utils-0.12.5-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291430" comment="v4l2loopback-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610485" comment="vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610486" comment="vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291431" comment="vhba-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610487" comment="virtualbox-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610488" comment="virtualbox-devel-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610489" comment="virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610490" comment="virtualbox-guest-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610491" comment="virtualbox-guest-tools-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610492" comment="virtualbox-guest-x11-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610493" comment="virtualbox-host-source-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610494" comment="virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610495" comment="virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610496" comment="virtualbox-qt-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610497" comment="virtualbox-vnc-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610498" comment="virtualbox-websrv-6.1.10-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610499" comment="xtables-addons-3.9-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173369" comment="xtables-addons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610500" comment="xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173370" comment="xtables-addons-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610501" comment="xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291433" comment="xtables-addons-kmp-preempt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16587</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16587" ref_url="https://www.suse.com/security/cve/CVE-2020-16587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16587/">CVE-2020-16587</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180108">SUSE bug 1180108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180109">SUSE bug 1180109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612620" comment="libIlmImf-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612621" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612622" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612623" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612624" comment="openexr-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612625" comment="openexr-devel-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612626" comment="openexr-doc-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16588</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A Null Pointer Deference issue exists in Academy Software Foundation OpenEXR 2.3.0 in generatePreview in makePreview.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180108">SUSE bug 1180108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612620" comment="libIlmImf-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612621" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612622" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612623" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612624" comment="openexr-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612625" comment="openexr-devel-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612626" comment="openexr-doc-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16589</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16589" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A head-based buffer overflow exists in Academy Software Foundation OpenEXR 2.3.0 in writeTileData in ImfTiledOutputFile.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180109">SUSE bug 1180109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612620" comment="libIlmImf-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612621" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612622" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612623" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612624" comment="openexr-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612625" comment="openexr-devel-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612626" comment="openexr-doc-2.2.1-lp152.7.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16590</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16591</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16600</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16600" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16600" ref_url="https://www.suse.com/security/cve/CVE-2020-16600" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GVBNGQ7UFOBASFEEHWPUJV3UG7BWUIRH/" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16600/">CVE-2020-16600</cve>
	<bugzilla href="https://bugzilla.suse.com/1190175">SUSE bug 1190175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651603" comment="mupdf-1.12.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651604" comment="mupdf-devel-static-1.12.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845</cve>
	<bugzilla href="https://bugzilla.suse.com/1174977">SUSE bug 1174977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610343" comment="go1.13-1.13.15-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610344" comment="go1.13-doc-1.13.15-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610345" comment="go1.13-race-1.13.15-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611053" comment="go1.14-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611054" comment="go1.14-doc-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611055" comment="go1.14-race-1.14.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16846" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611926" comment="python2-salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611927" comment="python3-salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611928" comment="salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611929" comment="salt-api-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611930" comment="salt-bash-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611931" comment="salt-cloud-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611932" comment="salt-doc-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611933" comment="salt-fish-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611934" comment="salt-master-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611935" comment="salt-minion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611936" comment="salt-proxy-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611937" comment="salt-ssh-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611938" comment="salt-standalone-formulas-configuration-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611939" comment="salt-syndic-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611940" comment="salt-zsh-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726</cve>
	<bugzilla href="https://bugzilla.suse.com/1164090">SUSE bug 1164090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611300" comment="conmon-2.0.20-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280795" comment="conmon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611301" comment="fuse-overlayfs-1.1.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611302" comment="libcontainers-common-20200727-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611303" comment="podman-2.0.6-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611304" comment="podman-cni-config-2.0.6-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17353</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17353" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17353" ref_url="https://www.suse.com/security/cve/CVE-2020-17353" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00221.html" source="SUSE-SU"/>
    <description>
    scm/define-stencil-commands.scm in LilyPond through 2.20.0, and 2.21.x through 2.21.4, when -dsafe is used, lacks restrictions on embedded-ps and embedded-svg, as demonstrated by including dangerous PostScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-17353/">CVE-2020-17353</cve>
	<bugzilla href="https://bugzilla.suse.com/1174949">SUSE bug 1174949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615744" comment="lilypond-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177290" comment="lilypond is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510423" comment="lilypond-doc-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177292" comment="lilypond-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510424" comment="lilypond-doc-cs-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177293" comment="lilypond-doc-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510425" comment="lilypond-doc-de-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177294" comment="lilypond-doc-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510426" comment="lilypond-doc-es-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177295" comment="lilypond-doc-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510427" comment="lilypond-doc-fr-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177296" comment="lilypond-doc-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510428" comment="lilypond-doc-hu-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177297" comment="lilypond-doc-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510429" comment="lilypond-doc-it-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177298" comment="lilypond-doc-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510430" comment="lilypond-doc-ja-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177299" comment="lilypond-doc-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510431" comment="lilypond-doc-nl-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177300" comment="lilypond-doc-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510432" comment="lilypond-doc-zh-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177301" comment="lilypond-doc-zh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615745" comment="lilypond-emmentaler-fonts-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177302" comment="lilypond-emmentaler-fonts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615746" comment="lilypond-fonts-common-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177303" comment="lilypond-fonts-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615747" comment="lilypond-texgy-fonts-2.20.0-lp152.2.5.10 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293416" comment="lilypond-texgy-fonts is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17367" ref_url="https://www.suse.com/security/cve/CVE-2020-17367" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJKSV64EI6OP7AKHJQVLFPJPOUXRN47F/" source="SUSE-SU"/>
    <description>
    Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17367/">CVE-2020-17367</cve>
	<bugzilla href="https://bugzilla.suse.com/1174986">SUSE bug 1174986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613135" comment="firejail-0.9.64.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291476" comment="firejail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17368" ref_url="https://www.suse.com/security/cve/CVE-2020-17368" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJKSV64EI6OP7AKHJQVLFPJPOUXRN47F/" source="SUSE-SU"/>
    <description>
    Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17368/">CVE-2020-17368</cve>
	<bugzilla href="https://bugzilla.suse.com/1174986">SUSE bug 1174986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613135" comment="firejail-0.9.64.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291476" comment="firejail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17437</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615277" comment="iscsiuio-0.7.8.6-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474403" comment="iscsiuio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615278" comment="libopeniscsiusr0_2_0-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474405" comment="libopeniscsiusr0_2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615279" comment="open-iscsi-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474407" comment="open-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615280" comment="open-iscsi-devel-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474409" comment="open-iscsi-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17438</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17438" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17438" ref_url="https://www.suse.com/security/cve/CVE-2020-17438" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-17438/">CVE-2020-17438</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615277" comment="iscsiuio-0.7.8.6-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474403" comment="iscsiuio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615278" comment="libopeniscsiusr0_2_0-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474405" comment="libopeniscsiusr0_2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615279" comment="open-iscsi-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474407" comment="open-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615280" comment="open-iscsi-devel-2.1.4-lp152.18.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474409" comment="open-iscsi-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17482</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17482" ref_url="https://www.suse.com/security/cve/CVE-2020-17482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00099.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17482/">CVE-2020-17482</cve>
	<bugzilla href="https://bugzilla.suse.com/1176535">SUSE bug 1176535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615748" comment="pdns-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009562716" comment="pdns-backend-geoip-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167901" comment="pdns-backend-geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615749" comment="pdns-backend-godbc-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167902" comment="pdns-backend-godbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615750" comment="pdns-backend-ldap-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615751" comment="pdns-backend-lua-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609918" comment="pdns-backend-mydns-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615752" comment="pdns-backend-mysql-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615753" comment="pdns-backend-postgresql-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615754" comment="pdns-backend-remote-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167903" comment="pdns-backend-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615755" comment="pdns-backend-sqlite3-4.3.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17489</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<bugzilla href="https://bugzilla.suse.com/1175155">SUSE bug 1175155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611941" comment="gnome-settings-daemon-3.34.2+0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154123" comment="gnome-settings-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611942" comment="gnome-settings-daemon-devel-3.34.2+0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298676" comment="gnome-settings-daemon-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611943" comment="gnome-settings-daemon-lang-3.34.2+0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154124" comment="gnome-settings-daemon-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611944" comment="gnome-shell-3.34.5-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151510" comment="gnome-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611945" comment="gnome-shell-calendar-3.34.5-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151512" comment="gnome-shell-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611946" comment="gnome-shell-devel-3.34.5-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162388" comment="gnome-shell-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611947" comment="gnome-shell-lang-3.34.5-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151513" comment="gnome-shell-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
    <description>
    The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611926" comment="python2-salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611927" comment="python3-salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611928" comment="salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611929" comment="salt-api-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611930" comment="salt-bash-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611931" comment="salt-cloud-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611932" comment="salt-doc-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611933" comment="salt-fish-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611934" comment="salt-master-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611935" comment="salt-minion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611936" comment="salt-proxy-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611937" comment="salt-ssh-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611938" comment="salt-standalone-formulas-configuration-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611939" comment="salt-syndic-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611940" comment="salt-zsh-completion-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1175204">SUSE bug 1175204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611961" comment="libwireshark13-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611962" comment="libwiretap10-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611963" comment="libwsutil11-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611964" comment="wireshark-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611965" comment="wireshark-devel-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611966" comment="wireshark-ui-qt-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLSRXEMNPXJ5APSF7LPSU6DIH47XLGMI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612253" comment="libQt5Bootstrap-devel-static-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612254" comment="libQt5Bootstrap-devel-static-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612255" comment="libQt5Concurrent-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612256" comment="libQt5Concurrent-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612257" comment="libQt5Concurrent5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612258" comment="libQt5Concurrent5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612259" comment="libQt5Core-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612260" comment="libQt5Core-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612261" comment="libQt5Core-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612262" comment="libQt5Core5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612263" comment="libQt5Core5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612264" comment="libQt5DBus-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612265" comment="libQt5DBus-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612266" comment="libQt5DBus-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612267" comment="libQt5DBus5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612268" comment="libQt5DBus5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612269" comment="libQt5Gui-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612270" comment="libQt5Gui-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612271" comment="libQt5Gui-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612272" comment="libQt5Gui5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612273" comment="libQt5Gui5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612274" comment="libQt5KmsSupport-devel-static-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245302" comment="libQt5KmsSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612275" comment="libQt5KmsSupport-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245303" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612276" comment="libQt5Network-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612277" comment="libQt5Network-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612278" comment="libQt5Network-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612279" comment="libQt5Network5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612280" comment="libQt5Network5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612281" comment="libQt5OpenGL-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612282" comment="libQt5OpenGL-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612283" comment="libQt5OpenGL-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612284" comment="libQt5OpenGL5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612285" comment="libQt5OpenGL5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612286" comment="libQt5OpenGLExtensions-devel-static-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612287" comment="libQt5OpenGLExtensions-devel-static-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612288" comment="libQt5PlatformHeaders-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612289" comment="libQt5PlatformSupport-devel-static-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612290" comment="libQt5PlatformSupport-devel-static-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612291" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612292" comment="libQt5PrintSupport-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612293" comment="libQt5PrintSupport-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612294" comment="libQt5PrintSupport-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612295" comment="libQt5PrintSupport5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612296" comment="libQt5PrintSupport5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612297" comment="libQt5Sql-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612298" comment="libQt5Sql-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612299" comment="libQt5Sql-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612300" comment="libQt5Sql5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612301" comment="libQt5Sql5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612302" comment="libQt5Sql5-mysql-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612303" comment="libQt5Sql5-mysql-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612304" comment="libQt5Sql5-postgresql-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612305" comment="libQt5Sql5-postgresql-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612306" comment="libQt5Sql5-sqlite-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612307" comment="libQt5Sql5-sqlite-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612308" comment="libQt5Sql5-unixODBC-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612309" comment="libQt5Sql5-unixODBC-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612310" comment="libQt5Test-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612311" comment="libQt5Test-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612312" comment="libQt5Test-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612313" comment="libQt5Test5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612314" comment="libQt5Test5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612315" comment="libQt5Widgets-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612316" comment="libQt5Widgets-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612317" comment="libQt5Widgets-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612318" comment="libQt5Widgets5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612319" comment="libQt5Widgets5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612320" comment="libQt5Xml-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612321" comment="libQt5Xml-devel-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612322" comment="libQt5Xml5-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612323" comment="libQt5Xml5-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611174" comment="libqt4-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611175" comment="libqt4-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611176" comment="libqt4-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611177" comment="libqt4-devel-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611178" comment="libqt4-devel-doc-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611179" comment="libqt4-devel-doc-data-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611180" comment="libqt4-linguist-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611181" comment="libqt4-private-headers-devel-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611182" comment="libqt4-qt3support-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611183" comment="libqt4-qt3support-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611184" comment="libqt4-sql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611185" comment="libqt4-sql-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611186" comment="libqt4-sql-postgresql-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611187" comment="libqt4-sql-sqlite-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611188" comment="libqt4-sql-sqlite-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611189" comment="libqt4-sql-unixODBC-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611190" comment="libqt4-x11-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611191" comment="libqt4-x11-32bit-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612324" comment="libqt5-qtbase-common-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612325" comment="libqt5-qtbase-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612326" comment="libqt5-qtbase-examples-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612327" comment="libqt5-qtbase-examples-32bit-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612328" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177209" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612329" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291866" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612330" comment="libqt5-qtbase-private-headers-devel-5.12.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611192" comment="qt4-x11-tools-4.8.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17521" ref_url="https://www.suse.com/security/cve/CVE-2020-17521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYXXLFFWNBEOWRTRF6VZBDCDBSGYTI4L/" source="SUSE-SU"/>
    <description>
    Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17521/">CVE-2020-17521</cve>
	<bugzilla href="https://bugzilla.suse.com/1179729">SUSE bug 1179729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612628" comment="groovy-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340627" comment="groovy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612629" comment="groovy-ant-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340628" comment="groovy-ant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612630" comment="groovy-bsf-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340629" comment="groovy-bsf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612631" comment="groovy-console-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340630" comment="groovy-console is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612632" comment="groovy-docgenerator-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340631" comment="groovy-docgenerator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612633" comment="groovy-groovydoc-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340632" comment="groovy-groovydoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612634" comment="groovy-groovysh-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340633" comment="groovy-groovysh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612635" comment="groovy-jmx-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340634" comment="groovy-jmx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612636" comment="groovy-json-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340635" comment="groovy-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612637" comment="groovy-jsr223-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340636" comment="groovy-jsr223 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612638" comment="groovy-lib-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340637" comment="groovy-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612639" comment="groovy-nio-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340638" comment="groovy-nio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612640" comment="groovy-servlet-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340639" comment="groovy-servlet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612641" comment="groovy-sql-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340640" comment="groovy-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612642" comment="groovy-swing-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340641" comment="groovy-swing is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612643" comment="groovy-templates-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340642" comment="groovy-templates is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612644" comment="groovy-test-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340643" comment="groovy-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612645" comment="groovy-testng-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340644" comment="groovy-testng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612646" comment="groovy-xml-2.4.21-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340645" comment="groovy-xml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AYDPBGEGJD6YYQGO757Q7KZRTMVUY3O/" source="SUSE-SU"/>
    <description>
    Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525</cve>
	<bugzilla href="https://bugzilla.suse.com/1181687">SUSE bug 1181687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613151" comment="libsvn_auth_gnome_keyring-1-0-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613152" comment="libsvn_auth_kwallet-1-0-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613153" comment="subversion-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613154" comment="subversion-bash-completion-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613155" comment="subversion-devel-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613156" comment="subversion-perl-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613157" comment="subversion-python-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613158" comment="subversion-python-ctypes-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154271" comment="subversion-python-ctypes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613159" comment="subversion-ruby-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613160" comment="subversion-server-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613161" comment="subversion-tools-1.10.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EA4UBW4STKIATR7VTJBCM2FBGG23C3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/633VPXBTLJ3ECQFTNOKFL457XMKHKZ32/" source="SUSE-SU"/>
    <description>
    While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527</cve>
	<bugzilla href="https://bugzilla.suse.com/1179602">SUSE bug 1179602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613755" comment="tomcat-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613756" comment="tomcat-admin-webapps-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613757" comment="tomcat-docs-webapp-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613758" comment="tomcat-el-3_0-api-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613759" comment="tomcat-embed-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613760" comment="tomcat-javadoc-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613761" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613762" comment="tomcat-jsvc-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613763" comment="tomcat-lib-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613764" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613765" comment="tomcat-webapps-9.0.36-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFMY5PC6YGRRPOTKEDLIS6VQ2KCVUDF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEVT5FS4C2453YNMGNJH5GEW4YPAD5DS/" source="SUSE-SU"/>
    <description>
    Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541</cve>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615105" comment="libjpeg-turbo-1.5.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152540" comment="libjpeg-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615106" comment="libjpeg62-62.2.0-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152541" comment="libjpeg62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615107" comment="libjpeg62-32bit-62.2.0-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166381" comment="libjpeg62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615108" comment="libjpeg62-devel-62.2.0-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152542" comment="libjpeg62-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615109" comment="libjpeg62-devel-32bit-62.2.0-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166384" comment="libjpeg62-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615110" comment="libjpeg62-turbo-1.5.3-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166386" comment="libjpeg62-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615111" comment="libjpeg8-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615112" comment="libjpeg8-32bit-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152544" comment="libjpeg8-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615113" comment="libjpeg8-devel-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166390" comment="libjpeg8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615114" comment="libjpeg8-devel-32bit-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166392" comment="libjpeg8-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615115" comment="libturbojpeg0-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152545" comment="libturbojpeg0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615116" comment="libturbojpeg0-32bit-8.1.2-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166395" comment="libturbojpeg0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1765" ref_url="https://www.suse.com/security/cve/CVE-2020-1765" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1765/">CVE-2020-1765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1766" ref_url="https://www.suse.com/security/cve/CVE-2020-1766" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1766/">CVE-2020-1766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1769" ref_url="https://www.suse.com/security/cve/CVE-2020-1769" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1769/">CVE-2020-1769</cve>
	<bugzilla href="https://bugzilla.suse.com/1168032">SUSE bug 1168032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1770" ref_url="https://www.suse.com/security/cve/CVE-2020-1770" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1770/">CVE-2020-1770</cve>
	<bugzilla href="https://bugzilla.suse.com/1168031">SUSE bug 1168031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1771" ref_url="https://www.suse.com/security/cve/CVE-2020-1771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-1771/">CVE-2020-1771</cve>
	<bugzilla href="https://bugzilla.suse.com/1168030">SUSE bug 1168030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1772" ref_url="https://www.suse.com/security/cve/CVE-2020-1772" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1772/">CVE-2020-1772</cve>
	<bugzilla href="https://bugzilla.suse.com/1168029">SUSE bug 1168029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1773" ref_url="https://www.suse.com/security/cve/CVE-2020-1773" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1773/">CVE-2020-1773</cve>
	<bugzilla href="https://bugzilla.suse.com/1168028">SUSE bug 1168028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615252" comment="otrs-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615253" comment="otrs-doc-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615254" comment="otrs-itsm-6.0.29-lp152.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTXOIYNDR72EDFNCBXMS56IU6ZLZOJMB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1651-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTVENJITKPNO2UD2FTT2WK4SNRNME6PL/" source="SUSE-SU"/>
    <description>
    Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614683" comment="graphviz-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167847" comment="graphviz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614684" comment="graphviz-devel-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167849" comment="graphviz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614685" comment="graphviz-doc-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167851" comment="graphviz-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614686" comment="graphviz-gd-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167853" comment="graphviz-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614687" comment="graphviz-gnome-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167855" comment="graphviz-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614688" comment="graphviz-guile-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167857" comment="graphviz-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614689" comment="graphviz-gvedit-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167859" comment="graphviz-gvedit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614690" comment="graphviz-java-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167861" comment="graphviz-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614691" comment="graphviz-lua-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167863" comment="graphviz-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614692" comment="graphviz-perl-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167865" comment="graphviz-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614693" comment="graphviz-php-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167867" comment="graphviz-php is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614694" comment="graphviz-plugins-core-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254560" comment="graphviz-plugins-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614695" comment="graphviz-python-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167871" comment="graphviz-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614696" comment="graphviz-ruby-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167873" comment="graphviz-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614697" comment="graphviz-smyrna-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167875" comment="graphviz-smyrna is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614698" comment="graphviz-tcl-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167877" comment="graphviz-tcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614699" comment="libgraphviz6-2.40.1-lp152.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254561" comment="libgraphviz6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18670" ref_url="https://www.suse.com/security/cve/CVE-2020-18670" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0931-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPPHYZD6Y3QJBTGPLX66Y3DJ3KCNEUJQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DFRT3CZ2UBV2PGLI4GUZ7AGDCQXVUQR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ELZ4EA3I6BCVA2NQEVPSEZ2M3Y5ASM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQFQAJIVNNLDRXMOUJWPMCCBT4WU5N5O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0974-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGT4RWCLEWSTAAYEWMVZRY24ZY53D2Z3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XDARRLWABODNP6ABT3DQ34TPYSH3ROH5/" source="SUSE-SU"/>
    <description>
    Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-18670/">CVE-2020-18670</cve>
	<bugzilla href="https://bugzilla.suse.com/1187707">SUSE bug 1187707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615863" comment="roundcubemail-1.3.16-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18671" ref_url="https://www.suse.com/security/cve/CVE-2020-18671" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0931-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPPHYZD6Y3QJBTGPLX66Y3DJ3KCNEUJQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DFRT3CZ2UBV2PGLI4GUZ7AGDCQXVUQR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ELZ4EA3I6BCVA2NQEVPSEZ2M3Y5ASM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQFQAJIVNNLDRXMOUJWPMCCBT4WU5N5O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0974-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGT4RWCLEWSTAAYEWMVZRY24ZY53D2Z3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XDARRLWABODNP6ABT3DQ34TPYSH3ROH5/" source="SUSE-SU"/>
    <description>
    Cross Site Scripting (XSS) vulnerability in Roundcube Mail &lt;=1.4.4 via smtp config in /installer/test.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-18671/">CVE-2020-18671</cve>
	<bugzilla href="https://bugzilla.suse.com/1187706">SUSE bug 1187706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615863" comment="roundcubemail-1.3.16-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html" source="SUSE-SU"/>
    <description>
    Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/1171696">SUSE bug 1171696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177180">SUSE bug 1177180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179729">SUSE bug 1179729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610001" comment="ant-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151811" comment="ant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610002" comment="ant-antlr-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235582" comment="ant-antlr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610003" comment="ant-apache-bcel-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235583" comment="ant-apache-bcel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610004" comment="ant-apache-bsf-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235584" comment="ant-apache-bsf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610005" comment="ant-apache-log4j-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235585" comment="ant-apache-log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610006" comment="ant-apache-oro-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235586" comment="ant-apache-oro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610007" comment="ant-apache-regexp-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235587" comment="ant-apache-regexp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610008" comment="ant-apache-resolver-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235588" comment="ant-apache-resolver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610009" comment="ant-apache-xalan2-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235589" comment="ant-apache-xalan2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610010" comment="ant-commons-logging-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235590" comment="ant-commons-logging is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610011" comment="ant-commons-net-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235591" comment="ant-commons-net is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610012" comment="ant-imageio-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291477" comment="ant-imageio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610013" comment="ant-javamail-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235592" comment="ant-javamail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610014" comment="ant-jdepend-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235593" comment="ant-jdepend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610015" comment="ant-jmf-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151812" comment="ant-jmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610016" comment="ant-jsch-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235594" comment="ant-jsch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610017" comment="ant-junit-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151813" comment="ant-junit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610018" comment="ant-junit5-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291478" comment="ant-junit5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610019" comment="ant-manual-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235595" comment="ant-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610020" comment="ant-scripts-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151814" comment="ant-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610021" comment="ant-swing-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151815" comment="ant-swing is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610022" comment="ant-testutil-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235596" comment="ant-testutil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610023" comment="ant-xz-1.10.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291479" comment="ant-xz is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1946</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXHYC7MWI2M6Y32ROZZBS5HOZOAF2HAN/" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186513">SUSE bug 1186513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614154" comment="perl-Mail-SpamAssassin-3.4.5-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261407" comment="perl-Mail-SpamAssassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614155" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261408" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614156" comment="spamassassin-3.4.5-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261409" comment="spamassassin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202019609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-19609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-19609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19609" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-19609" ref_url="https://www.suse.com/security/cve/CVE-2020-19609" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GVBNGQ7UFOBASFEEHWPUJV3UG7BWUIRH/" source="SUSE-SU"/>
    <description>
    Artifex MuPDF before 1.18.0 has a heap based buffer over-write in tiff_expand_colormap() function when parsing TIFF files allowing attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-19609/">CVE-2020-19609</cve>
	<bugzilla href="https://bugzilla.suse.com/1190176">SUSE bug 1190176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651603" comment="mupdf-1.12.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651604" comment="mupdf-devel-static-1.12.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202019667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-19667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-19667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612762" comment="cargo-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265404" comment="cargo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612763" comment="cargo-doc-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265405" comment="cargo-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612764" comment="clippy-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265406" comment="clippy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612765" comment="rls-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265407" comment="rls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612766" comment="rust-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238244" comment="rust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612767" comment="rust-analysis-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265408" comment="rust-analysis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612768" comment="rust-cbindgen-0.14.1-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612769" comment="rust-doc-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238245" comment="rust-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612770" comment="rust-gdb-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238246" comment="rust-gdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612771" comment="rust-src-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238247" comment="rust-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612772" comment="rust-std-static-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265410" comment="rust-std-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612773" comment="rustfmt-1.43.1-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265411" comment="rustfmt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMYUDIGG7RM42AIH4Q3WW4VZGFRAPLQ7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YDLYD3JFZSOPG5DPXOHFTMZTUOLPOK5J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DET3T3KBOIXDZC2VZ5XGHXVGQ54LOAI5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGJECGZC6A7C36WKBWL3FKK6U7IGO4OK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196179">SUSE bug 1196179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612424" comment="libopenssl-1_0_0-devel-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612425" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612416" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612417" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612426" comment="libopenssl10-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338634" comment="libopenssl10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612427" comment="libopenssl1_0_0-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612428" comment="libopenssl1_0_0-32bit-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612429" comment="libopenssl1_0_0-hmac-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612430" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612431" comment="libopenssl1_0_0-steam-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612432" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612418" comment="libopenssl1_1-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612419" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612420" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612421" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614475" comment="nodejs10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614476" comment="nodejs10-devel-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614477" comment="nodejs10-docs-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614466" comment="nodejs12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614467" comment="nodejs12-devel-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614468" comment="nodejs12-docs-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614478" comment="npm10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614469" comment="npm12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612433" comment="openssl-1_0_0-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612434" comment="openssl-1_0_0-cavs-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612435" comment="openssl-1_0_0-doc-1.0.2p-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612422" comment="openssl-1_1-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612423" comment="openssl-1_1-doc-1.1.1d-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21529" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21530</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21530" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21532" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21533" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21535" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21680" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202023903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-23903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-23903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1538-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVNURRS2JE5OAOZLI3BVLEQCWIGU65MY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3JTMWLYWFOOWVMDAUX2VBB5ZULOV3LY/" source="SUSE-SU"/>
    <description>
    A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659206" comment="libspeex1-1.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658869" comment="libspeex1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659207" comment="libspeex1-32bit-1.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658870" comment="libspeex1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659208" comment="speex-1.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658871" comment="speex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659209" comment="speex-devel-1.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658872" comment="speex-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24119</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24119" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24119" ref_url="https://www.suse.com/security/cve/CVE-2020-24119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V2GCFGL5HHPU3GIC7XYIPIMYFFLH2M4U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UWDYSXHR43QUBRLPE6NYJWEL7D2AOPPX/" source="SUSE-SU"/>
    <description>
    A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24119/">CVE-2020-24119</cve>
	<bugzilla href="https://bugzilla.suse.com/1186238">SUSE bug 1186238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615756" comment="upx-3.96-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24352</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611452" comment="qemu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611453" comment="qemu-arm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611454" comment="qemu-audio-alsa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611455" comment="qemu-audio-pa-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611456" comment="qemu-audio-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611457" comment="qemu-block-curl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611458" comment="qemu-block-dmg-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611459" comment="qemu-block-gluster-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611460" comment="qemu-block-iscsi-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611461" comment="qemu-block-nfs-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611462" comment="qemu-block-rbd-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611463" comment="qemu-block-ssh-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611464" comment="qemu-extra-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611465" comment="qemu-guest-agent-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611466" comment="qemu-ipxe-1.0.0+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611467" comment="qemu-ksm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611468" comment="qemu-kvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611469" comment="qemu-lang-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611470" comment="qemu-linux-user-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611471" comment="qemu-microvm-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611472" comment="qemu-ppc-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611473" comment="qemu-s390-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611474" comment="qemu-seabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611475" comment="qemu-sgabios-8-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611476" comment="qemu-testsuite-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611477" comment="qemu-tools-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611478" comment="qemu-ui-curses-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611479" comment="qemu-ui-gtk-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611480" comment="qemu-ui-sdl-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611481" comment="qemu-ui-spice-app-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611482" comment="qemu-vgabios-1.12.1+-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611483" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611484" comment="qemu-x86-4.2.1-lp152.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24368" ref_url="https://www.suse.com/security/cve/CVE-2020-24368" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html" source="SUSE-SU"/>
    <description>
    Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24368/">CVE-2020-24368</cve>
	<bugzilla href="https://bugzilla.suse.com/1175530">SUSE bug 1175530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615757" comment="icingacli-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615758" comment="icingaweb2-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615759" comment="icingaweb2-common-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615760" comment="icingaweb2-vendor-HTMLPurifier-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615761" comment="icingaweb2-vendor-JShrink-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615762" comment="icingaweb2-vendor-Parsedown-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615763" comment="icingaweb2-vendor-dompdf-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615764" comment="icingaweb2-vendor-lessphp-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615765" comment="icingaweb2-vendor-zf1-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615766" comment="php-Icinga-2.7.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24370</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624156" comment="liblua5_3-5-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244414" comment="liblua5_3-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624157" comment="liblua5_3-5-32bit-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244415" comment="liblua5_3-5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624158" comment="lua53-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244416" comment="lua53 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624159" comment="lua53-devel-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244417" comment="lua53-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624160" comment="lua53-doc-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244418" comment="lua53-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24371</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624156" comment="liblua5_3-5-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244414" comment="liblua5_3-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624157" comment="liblua5_3-5-32bit-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244415" comment="liblua5_3-5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624158" comment="lua53-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244416" comment="lua53 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624159" comment="lua53-devel-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244417" comment="lua53-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624160" comment="lua53-doc-5.3.6-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244418" comment="lua53-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613097" comment="dovecot23-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613098" comment="dovecot23-backend-mysql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613099" comment="dovecot23-backend-pgsql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613100" comment="dovecot23-backend-sqlite-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613101" comment="dovecot23-devel-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613102" comment="dovecot23-fts-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613103" comment="dovecot23-fts-lucene-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613104" comment="dovecot23-fts-solr-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613105" comment="dovecot23-fts-squat-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24489</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192359">SUSE bug 1192359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615068" comment="ucode-intel-20210525-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615068" comment="ucode-intel-20210525-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615068" comment="ucode-intel-20210525-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24513</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615068" comment="ucode-intel-20210525-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html" source="SUSE-SU"/>
    <description>
    Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553</cve>
	<bugzilla href="https://bugzilla.suse.com/1176031">SUSE bug 1176031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611422" comment="go1.14-1.14.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611423" comment="go1.14-doc-1.14.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611424" comment="go1.14-race-1.14.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24586</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24587</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24588</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199701">SUSE bug 1199701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24606</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606" source="SUSE CVE"/>
		<reference ref_id="GHSA-vvj7-xjgq-g2jg" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-vvj7-xjgq-g2jg" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611006" comment="squid-4.13-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24614" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24614" ref_url="https://www.suse.com/security/cve/CVE-2020-24614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS65E7ITOHOY4RHXJ7DZFLWTUOAZFGZS/" source="SUSE-SU"/>
    <description>
    Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24614/">CVE-2020-24614</cve>
	<bugzilla href="https://bugzilla.suse.com/1175760">SUSE bug 1175760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615767" comment="fossil-2.12.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168274" comment="fossil is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24654" ref_url="https://www.suse.com/security/cve/CVE-2020-24654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1310-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00046.html" source="SUSE-SU"/>
    <description>
    In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24654/">CVE-2020-24654</cve>
	<bugzilla href="https://bugzilla.suse.com/1175857">SUSE bug 1175857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615768" comment="ark-20.04.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154016" comment="ark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615769" comment="ark-lang-20.04.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289271" comment="ark-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609936" comment="libkerfuffle18-18.12.3-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289272" comment="libkerfuffle18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009511948" comment="libkerfuffle20-20.04.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291475" comment="libkerfuffle20 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659</cve>
	<bugzilla href="https://bugzilla.suse.com/1176181">SUSE bug 1176181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178057">SUSE bug 1178057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611676" comment="gnutls-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611677" comment="gnutls-guile-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611678" comment="libgnutls-dane-devel-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611679" comment="libgnutls-dane0-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611680" comment="libgnutls-devel-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611681" comment="libgnutls-devel-32bit-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611682" comment="libgnutls30-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611683" comment="libgnutls30-32bit-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611684" comment="libgnutls30-hmac-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611685" comment="libgnutls30-hmac-32bit-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611686" comment="libgnutlsxx-devel-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611687" comment="libgnutlsxx28-3.6.7-lp152.9.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html" source="SUSE-SU"/>
    <description>
    GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611120" comment="libxml2-2-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611121" comment="libxml2-2-32bit-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611122" comment="libxml2-devel-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611123" comment="libxml2-devel-32bit-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611124" comment="libxml2-doc-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611125" comment="libxml2-tools-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611126" comment="python2-libxml2-python-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611127" comment="python3-libxml2-python-2.9.7-lp152.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24994</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24994" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24994" ref_url="https://www.suse.com/security/cve/CVE-2020-24994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008803.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSOO525LAGINT6Q7P6QLOLGYVE43LSBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYONME5VDBAM5FSXOCS4YFULDEBSTWDL/" source="SUSE-SU"/>
    <description>
    Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24994/">CVE-2020-24994</cve>
	<bugzilla href="https://bugzilla.suse.com/1184153">SUSE bug 1184153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614745" comment="libass-devel-0.14.0-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153843" comment="libass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614746" comment="libass9-0.14.0-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177230" comment="libass9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614747" comment="libass9-32bit-0.14.0-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348105" comment="libass9-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032</cve>
	<bugzilla href="https://bugzilla.suse.com/1175986">SUSE bug 1175986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605185" comment="python2-Flask-Cors-3.0.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009292844" comment="python2-Flask-Cors is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605186" comment="python3-Flask-Cors-3.0.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009292846" comment="python3-Flask-Cors is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25039" ref_url="https://www.suse.com/security/cve/CVE-2020-25039" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00243.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25039/">CVE-2020-25039</cve>
	<bugzilla href="https://bugzilla.suse.com/1176705">SUSE bug 1176705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176707">SUSE bug 1176707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605285" comment="singularity-3.6.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25040" ref_url="https://www.suse.com/security/cve/CVE-2020-25040" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00243.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25040/">CVE-2020-25040</cve>
	<bugzilla href="https://bugzilla.suse.com/1176707">SUSE bug 1176707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605285" comment="singularity-3.6.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25074" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25074" ref_url="https://www.suse.com/security/cve/CVE-2020-25074" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWQ3H4AUJA2F3ISKMWL6QTCZID5AYFKR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMUGPIPMLTP6KSHV2XRIESFS7OGOBXW6/" source="SUSE-SU"/>
    <description>
    The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-25074/">CVE-2020-25074</cve>
	<bugzilla href="https://bugzilla.suse.com/1178744">SUSE bug 1178744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612055" comment="moinmoin-wiki-1.9.11-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237153" comment="moinmoin-wiki is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25084</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25085</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085</cve>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25097</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25097" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097" source="SUSE CVE"/>
		<reference ref_id="GHSA-jvf6-h9gj-pmj6" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-jvf6-h9gj-pmj6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615080" comment="squid-4.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25211</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192356">SUSE bug 1192356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25212</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611498" comment="libproxy-devel-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151761" comment="libproxy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611499" comment="libproxy-sharp-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295954" comment="libproxy-sharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611500" comment="libproxy-tools-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295955" comment="libproxy-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611501" comment="libproxy1-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151762" comment="libproxy1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611502" comment="libproxy1-32bit-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295956" comment="libproxy1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611503" comment="libproxy1-config-gnome3-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151763" comment="libproxy1-config-gnome3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611504" comment="libproxy1-config-kde-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154112" comment="libproxy1-config-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611505" comment="libproxy1-networkmanager-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151765" comment="libproxy1-networkmanager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611506" comment="libproxy1-pacrunner-webkit-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151766" comment="libproxy1-pacrunner-webkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611507" comment="perl-Net-Libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295957" comment="perl-Net-Libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611508" comment="python-libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295958" comment="python-libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611509" comment="python3-libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295959" comment="python3-libproxy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25275" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25275" ref_url="https://www.suse.com/security/cve/CVE-2020-25275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25275/">CVE-2020-25275</cve>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613097" comment="dovecot23-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613098" comment="dovecot23-backend-mysql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613099" comment="dovecot23-backend-pgsql-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613100" comment="dovecot23-backend-sqlite-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613101" comment="dovecot23-devel-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613102" comment="dovecot23-fts-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613103" comment="dovecot23-fts-lucene-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613104" comment="dovecot23-fts-solr-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613105" comment="dovecot23-fts-squat-2.3.11.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25559" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25559" ref_url="https://www.suse.com/security/cve/CVE-2020-25559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKEZYDL7ZTBAXXRLNGPXPFNXRKWZ3MXC/" source="SUSE-SU"/>
    <description>
    gnuplot 5.5 is affected by double free when executing print_set_output. This may result in context-dependent arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25559/">CVE-2020-25559</cve>
	<bugzilla href="https://bugzilla.suse.com/1176689">SUSE bug 1176689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613304" comment="gnuplot-5.2.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251345" comment="gnuplot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613305" comment="gnuplot-doc-5.2.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251346" comment="gnuplot-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611926" comment="python2-salt-3000-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it's better to assume that it does.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25596</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25597</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don't use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598</cve>
	<bugzilla href="https://bugzilla.suse.com/1176341">SUSE bug 1176341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25600</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn't get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25601</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25602</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602</cve>
	<bugzilla href="https://bugzilla.suse.com/1176339">SUSE bug 1176339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25603</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25604</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn't acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611435" comment="xen-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611436" comment="xen-devel-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611437" comment="xen-doc-html-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611438" comment="xen-libs-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611439" comment="xen-libs-32bit-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611440" comment="xen-tools-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611441" comment="xen-tools-domU-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611442" comment="xen-tools-xendomains-wait-disk-4.13.1_08-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPFN4SV4JCJUNCQC4PQZ6VEJN63VN2FS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613</cve>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613849" comment="libruby2_5-2_5-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613850" comment="ruby2.5-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613851" comment="ruby2.5-devel-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613852" comment="ruby2.5-devel-extra-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613853" comment="ruby2.5-doc-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613854" comment="ruby2.5-doc-ri-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613855" comment="ruby2.5-stdlib-2.5.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25626</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25626" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25626" ref_url="https://www.suse.com/security/cve/CVE-2020-25626" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0322-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3GZDKNNVOILNHAK6KSWOYM6URRERTB4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NYNAEPY3UVCIEUTPMQBXFJ42XJG7RVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious &lt;script&gt; tags, leading to a cross-site-scripting (XSS) vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-25626/">CVE-2020-25626</cve>
	<bugzilla href="https://bugzilla.suse.com/1177205">SUSE bug 1177205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613252" comment="python3-djangorestframework-3.11.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009345813" comment="python3-djangorestframework is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25632</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25637</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611735" comment="libvirt-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611736" comment="libvirt-admin-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611737" comment="libvirt-bash-completion-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611738" comment="libvirt-client-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611739" comment="libvirt-daemon-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611740" comment="libvirt-daemon-config-network-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611741" comment="libvirt-daemon-config-nwfilter-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611742" comment="libvirt-daemon-driver-interface-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611743" comment="libvirt-daemon-driver-libxl-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611744" comment="libvirt-daemon-driver-lxc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611745" comment="libvirt-daemon-driver-network-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611746" comment="libvirt-daemon-driver-nodedev-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611747" comment="libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611748" comment="libvirt-daemon-driver-qemu-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611749" comment="libvirt-daemon-driver-secret-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611750" comment="libvirt-daemon-driver-storage-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611751" comment="libvirt-daemon-driver-storage-core-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611752" comment="libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611753" comment="libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611754" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611755" comment="libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611756" comment="libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611757" comment="libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611758" comment="libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611759" comment="libvirt-daemon-hooks-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611760" comment="libvirt-daemon-lxc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611761" comment="libvirt-daemon-qemu-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611762" comment="libvirt-daemon-xen-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611763" comment="libvirt-devel-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611764" comment="libvirt-devel-32bit-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611765" comment="libvirt-doc-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611766" comment="libvirt-libs-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611767" comment="libvirt-lock-sanlock-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611768" comment="libvirt-nss-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611769" comment="wireshark-plugin-libvirt-6.0.0-lp152.9.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25639</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25639" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25643</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25645</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611567" comment="kernel-debug-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611568" comment="kernel-debug-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611569" comment="kernel-default-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611570" comment="kernel-default-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611571" comment="kernel-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611572" comment="kernel-docs-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611573" comment="kernel-docs-html-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611574" comment="kernel-kvmsmall-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611575" comment="kernel-kvmsmall-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611576" comment="kernel-macros-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611577" comment="kernel-obs-build-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611578" comment="kernel-obs-qa-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611579" comment="kernel-preempt-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611580" comment="kernel-preempt-devel-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611581" comment="kernel-source-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611582" comment="kernel-source-vanilla-5.3.18-lp152.47.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611583" comment="kernel-syms-5.3.18-lp152.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648</cve>
	<bugzilla href="https://bugzilla.suse.com/1177917">SUSE bug 1177917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633723" comment="libfreebl3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633724" comment="libfreebl3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633725" comment="libfreebl3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633726" comment="libfreebl3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633727" comment="libsoftokn3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633728" comment="libsoftokn3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633729" comment="libsoftokn3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633730" comment="libsoftokn3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633731" comment="mozilla-nspr-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633732" comment="mozilla-nspr-32bit-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633733" comment="mozilla-nspr-devel-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633734" comment="mozilla-nss-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633735" comment="mozilla-nss-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633736" comment="mozilla-nss-certs-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633737" comment="mozilla-nss-certs-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633738" comment="mozilla-nss-devel-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633739" comment="mozilla-nss-sysinit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633740" comment="mozilla-nss-sysinit-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633741" comment="mozilla-nss-tools-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25649</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011022.html" source="SUSE-SU"/>
    <description>
    A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613002" comment="jackson-databind-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342652" comment="jackson-databind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613003" comment="jackson-databind-javadoc-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342653" comment="jackson-databind-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25650</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25650" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650</cve>
	<bugzilla href="https://bugzilla.suse.com/1177780">SUSE bug 1177780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611990" comment="spice-vdagent-0.19.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171081" comment="spice-vdagent is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651</cve>
	<bugzilla href="https://bugzilla.suse.com/1177781">SUSE bug 1177781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611990" comment="spice-vdagent-0.19.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171081" comment="spice-vdagent is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652</cve>
	<bugzilla href="https://bugzilla.suse.com/1177782">SUSE bug 1177782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611990" comment="spice-vdagent-0.19.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171081" comment="spice-vdagent is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653</cve>
	<bugzilla href="https://bugzilla.suse.com/1177783">SUSE bug 1177783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611990" comment="spice-vdagent-0.19.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171081" comment="spice-vdagent is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00015.html" source="SUSE-SU"/>
    <description>
    An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654</cve>
	<bugzilla href="https://bugzilla.suse.com/1173668">SUSE bug 1173668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177916">SUSE bug 1177916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611776" comment="libpacemaker-devel-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153792" comment="libpacemaker-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611777" comment="libpacemaker3-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153793" comment="libpacemaker3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611778" comment="pacemaker-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153794" comment="pacemaker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611779" comment="pacemaker-cli-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153795" comment="pacemaker-cli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611780" comment="pacemaker-cts-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153796" comment="pacemaker-cts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611781" comment="pacemaker-remote-2.0.4+20200616.2deceaa3a-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153797" comment="pacemaker-remote is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HSP2RSDCASVO7P7KBUV5GDZ6SYI6L7I/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615478" comment="python2-cryptography-2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238250" comment="python2-cryptography is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615479" comment="python2-cryptography-vectors-2.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350110" comment="python2-cryptography-vectors is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615695" comment="python3-cryptography-2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615696" comment="python3-cryptography-vectors-2.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350540" comment="python3-cryptography-vectors is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYSOMAWYA2XHVHZ46F322TCUWNWMG4GU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWM64T57Y7IVDW2JWVLZSHPUKMYGWGAH/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660</cve>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612182" comment="ceph-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612183" comment="ceph-base-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612184" comment="ceph-common-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612185" comment="ceph-fuse-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612186" comment="ceph-grafana-dashboards-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612187" comment="ceph-immutable-object-cache-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612188" comment="ceph-mds-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612189" comment="ceph-mgr-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612190" comment="ceph-mgr-cephadm-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612191" comment="ceph-mgr-dashboard-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612192" comment="ceph-mgr-diskprediction-cloud-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612193" comment="ceph-mgr-diskprediction-local-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612194" comment="ceph-mgr-k8sevents-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612195" comment="ceph-mgr-modules-core-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612196" comment="ceph-mgr-rook-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612197" comment="ceph-mon-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612198" comment="ceph-osd-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612199" comment="ceph-prometheus-alerts-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612200" comment="ceph-radosgw-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612201" comment="ceph-test-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612202" comment="cephadm-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612203" comment="cephfs-shell-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612204" comment="libcephfs-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612205" comment="libcephfs2-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612206" comment="librados-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612207" comment="librados2-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612208" comment="libradospp-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612209" comment="librbd-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612210" comment="librbd1-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612211" comment="librgw-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612212" comment="librgw2-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612213" comment="python3-ceph-argparse-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612214" comment="python3-ceph-common-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612215" comment="python3-cephfs-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612216" comment="python3-rados-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612217" comment="python3-rbd-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612218" comment="python3-rgw-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612219" comment="rados-objclass-devel-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612220" comment="rbd-fuse-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612221" comment="rbd-mirror-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612222" comment="rbd-nbd-15.2.5.667+g1a579d5bf2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25665</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25668</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25678" ref_url="https://www.suse.com/security/cve/CVE-2020-25678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNSWJAZ3F5NDFCU63NISQ76JHRYOI25U/" source="SUSE-SU"/>
    <description>
    A flaw was found in ceph in versions prior to 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-25678/">CVE-2020-25678</cve>
	<bugzilla href="https://bugzilla.suse.com/1178905">SUSE bug 1178905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614109" comment="ceph-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614110" comment="ceph-base-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614111" comment="ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614112" comment="ceph-fuse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614113" comment="ceph-grafana-dashboards-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614114" comment="ceph-immutable-object-cache-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614115" comment="ceph-mds-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614116" comment="ceph-mgr-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614117" comment="ceph-mgr-cephadm-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614118" comment="ceph-mgr-dashboard-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614119" comment="ceph-mgr-diskprediction-cloud-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614120" comment="ceph-mgr-diskprediction-local-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614121" comment="ceph-mgr-k8sevents-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614122" comment="ceph-mgr-modules-core-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614123" comment="ceph-mgr-rook-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614124" comment="ceph-mon-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614125" comment="ceph-osd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614126" comment="ceph-prometheus-alerts-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614127" comment="ceph-radosgw-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614128" comment="ceph-test-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614129" comment="cephadm-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614130" comment="cephfs-shell-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614131" comment="libcephfs-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614132" comment="libcephfs2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614133" comment="librados-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614134" comment="librados2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614135" comment="libradospp-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614136" comment="librbd-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614137" comment="librbd1-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614138" comment="librgw-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614139" comment="librgw2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614140" comment="python3-ceph-argparse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614141" comment="python3-ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614142" comment="python3-cephfs-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614143" comment="python3-rados-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614144" comment="python3-rbd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614145" comment="python3-rgw-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614146" comment="rados-objclass-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614147" comment="rbd-fuse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614148" comment="rbd-mirror-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614149" comment="rbd-nbd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25684</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25686</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25687" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612926" comment="dnsmasq-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612927" comment="dnsmasq-utils-2.78-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25692</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007764.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VC65YBN4WMTACGDQE7SGD2ZBAJBKS3O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5OV5ACOVPOXU3LAYTZRU6RI5XRK4L6W/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612020" comment="libldap-2_4-2-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612021" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612022" comment="libldap-data-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612023" comment="openldap2-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612024" comment="openldap2-back-meta-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612025" comment="openldap2-back-perl-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612026" comment="openldap2-back-sock-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612027" comment="openldap2-back-sql-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612028" comment="openldap2-client-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612029" comment="openldap2-contrib-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612030" comment="openldap2-devel-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612031" comment="openldap2-devel-32bit-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612032" comment="openldap2-devel-static-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612033" comment="openldap2-doc-2.4.46-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612034" comment="openldap2-ppolicy-check-password-1.2-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612094" comment="libecpg6-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612095" comment="libecpg6-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612096" comment="libpq5-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612097" comment="libpq5-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613285" comment="postgresql-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613286" comment="postgresql-contrib-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613287" comment="postgresql-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613288" comment="postgresql-docs-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613289" comment="postgresql-llvmjit-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613290" comment="postgresql-plperl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613291" comment="postgresql-plpython-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613292" comment="postgresql-pltcl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613293" comment="postgresql-server-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613294" comment="postgresql-server-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613295" comment="postgresql-test-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612109" comment="postgresql10-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612110" comment="postgresql10-contrib-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612111" comment="postgresql10-devel-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612112" comment="postgresql10-docs-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612113" comment="postgresql10-plperl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612114" comment="postgresql10-plpython-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612115" comment="postgresql10-pltcl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612116" comment="postgresql10-server-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612117" comment="postgresql10-test-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612098" comment="postgresql12-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612099" comment="postgresql12-contrib-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612100" comment="postgresql12-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612101" comment="postgresql12-docs-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612102" comment="postgresql12-llvmjit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612103" comment="postgresql12-plperl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612104" comment="postgresql12-plpython-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612105" comment="postgresql12-pltcl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612106" comment="postgresql12-server-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612107" comment="postgresql12-server-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612108" comment="postgresql12-test-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612094" comment="libecpg6-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612095" comment="libecpg6-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612096" comment="libpq5-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612097" comment="libpq5-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613285" comment="postgresql-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613286" comment="postgresql-contrib-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613287" comment="postgresql-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613288" comment="postgresql-docs-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613289" comment="postgresql-llvmjit-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613290" comment="postgresql-plperl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613291" comment="postgresql-plpython-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613292" comment="postgresql-pltcl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613293" comment="postgresql-server-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613294" comment="postgresql-server-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613295" comment="postgresql-test-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612109" comment="postgresql10-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612110" comment="postgresql10-contrib-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612111" comment="postgresql10-devel-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612112" comment="postgresql10-docs-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612113" comment="postgresql10-plperl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612114" comment="postgresql10-plpython-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612115" comment="postgresql10-pltcl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612116" comment="postgresql10-server-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612117" comment="postgresql10-test-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612098" comment="postgresql12-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612099" comment="postgresql12-contrib-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612100" comment="postgresql12-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612101" comment="postgresql12-docs-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612102" comment="postgresql12-llvmjit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612103" comment="postgresql12-plperl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612104" comment="postgresql12-plpython-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612105" comment="postgresql12-pltcl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612106" comment="postgresql12-server-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612107" comment="postgresql12-server-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612108" comment="postgresql12-test-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612094" comment="libecpg6-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612095" comment="libecpg6-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612096" comment="libpq5-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612097" comment="libpq5-32bit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613285" comment="postgresql-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613286" comment="postgresql-contrib-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613287" comment="postgresql-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613288" comment="postgresql-docs-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613289" comment="postgresql-llvmjit-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613290" comment="postgresql-plperl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613291" comment="postgresql-plpython-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613292" comment="postgresql-pltcl-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613293" comment="postgresql-server-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613294" comment="postgresql-server-devel-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613295" comment="postgresql-test-13-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612109" comment="postgresql10-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612110" comment="postgresql10-contrib-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612111" comment="postgresql10-devel-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612112" comment="postgresql10-docs-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612113" comment="postgresql10-plperl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612114" comment="postgresql10-plpython-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612115" comment="postgresql10-pltcl-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612116" comment="postgresql10-server-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612117" comment="postgresql10-test-10.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612098" comment="postgresql12-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612099" comment="postgresql12-contrib-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612100" comment="postgresql12-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612101" comment="postgresql12-docs-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612102" comment="postgresql12-llvmjit-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612103" comment="postgresql12-plperl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612104" comment="postgresql12-plpython-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612105" comment="postgresql12-pltcl-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612106" comment="postgresql12-server-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612107" comment="postgresql12-server-devel-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612108" comment="postgresql12-test-12.5-lp152.3.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705" source="SUSE CVE"/>
		<reference ref_id="SADDNS-BLOG" ref_url="https://www.suse.com/c/suse-releases-fix-for-saddns-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="TID000019786" ref_url="https://www.suse.com/support/kb/doc/?id=000019786" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612360" comment="kernel-default-base-5.3.18-lp152.54.1.lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612361" comment="kernel-default-base-rebuild-5.3.18-lp152.54.1.lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE5HT53OIOVH6753LHKM4XRKGN6GM3K6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZC6Q36DSCUZTCIKGNLVYAKNWAL4N775/" source="SUSE-SU"/>
    <description>
    A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610112" comment="LibVNCServer-devel-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610113" comment="libvncclient0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610114" comment="libvncserver0-0.9.10-lp152.9.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612882" comment="libldap-2_4-2-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612883" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612884" comment="libldap-data-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612885" comment="openldap2-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612886" comment="openldap2-back-meta-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612887" comment="openldap2-back-perl-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612888" comment="openldap2-back-sock-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612889" comment="openldap2-back-sql-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612890" comment="openldap2-client-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612891" comment="openldap2-contrib-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612892" comment="openldap2-devel-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612893" comment="openldap2-devel-32bit-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612894" comment="openldap2-devel-static-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612895" comment="openldap2-doc-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612896" comment="openldap2-ppolicy-check-password-1.2-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612882" comment="libldap-2_4-2-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612883" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612884" comment="libldap-data-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612885" comment="openldap2-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612886" comment="openldap2-back-meta-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612887" comment="openldap2-back-perl-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612888" comment="openldap2-back-sock-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612889" comment="openldap2-back-sql-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612890" comment="openldap2-client-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612891" comment="openldap2-contrib-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612892" comment="openldap2-devel-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612893" comment="openldap2-devel-32bit-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612894" comment="openldap2-devel-static-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612895" comment="openldap2-doc-2.4.46-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612896" comment="openldap2-ppolicy-check-password-1.2-lp152.14.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612337" comment="xorg-x11-server-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612338" comment="xorg-x11-server-extra-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612339" comment="xorg-x11-server-sdk-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612340" comment="xorg-x11-server-source-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612341" comment="xorg-x11-server-wayland-1.20.3-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25717</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="TID000020533" ref_url="https://www.suse.com/support/kb/doc/?id=000020533" source="SUSE-SU"/>
		<reference ref_id="TID000020593" ref_url="https://www.suse.com/support/kb/doc/?id=000020593" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJMHDQABDOOUGOYNHF2X56XA57GXYYSN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192505">SUSE bug 1192505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192601">SUSE bug 1192601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193011">SUSE bug 1193011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194049">SUSE bug 1194049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194307">SUSE bug 1194307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195815">SUSE bug 1195815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196344">SUSE bug 1196344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196717">SUSE bug 1196717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196920">SUSE bug 1196920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661712" comment="ctdb-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661713" comment="ctdb-pcp-pmda-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661714" comment="ctdb-tests-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661715" comment="libdcerpc-binding0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661716" comment="libdcerpc-binding0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661717" comment="libdcerpc-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661718" comment="libdcerpc-samr-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661719" comment="libdcerpc-samr0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661720" comment="libdcerpc-samr0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661721" comment="libdcerpc0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661722" comment="libdcerpc0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661723" comment="libndr-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661724" comment="libndr-krb5pac-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661725" comment="libndr-krb5pac0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661726" comment="libndr-krb5pac0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661727" comment="libndr-nbt-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661728" comment="libndr-nbt0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661729" comment="libndr-nbt0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661730" comment="libndr-standard-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661731" comment="libndr-standard0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661732" comment="libndr-standard0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661733" comment="libndr0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661734" comment="libndr0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661735" comment="libnetapi-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661736" comment="libnetapi-devel-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661737" comment="libnetapi0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661738" comment="libnetapi0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661739" comment="libsamba-credentials-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661740" comment="libsamba-credentials0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661741" comment="libsamba-credentials0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661742" comment="libsamba-errors-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661743" comment="libsamba-errors0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661744" comment="libsamba-errors0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661745" comment="libsamba-hostconfig-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661746" comment="libsamba-hostconfig0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661747" comment="libsamba-hostconfig0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661748" comment="libsamba-passdb-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661749" comment="libsamba-passdb0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661750" comment="libsamba-passdb0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661751" comment="libsamba-policy-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661752" comment="libsamba-policy-python3-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661753" comment="libsamba-policy0-python3-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661754" comment="libsamba-policy0-python3-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661755" comment="libsamba-util-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661756" comment="libsamba-util0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661757" comment="libsamba-util0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661758" comment="libsamdb-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661759" comment="libsamdb0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661760" comment="libsamdb0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661761" comment="libsmbclient-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661762" comment="libsmbclient0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661763" comment="libsmbclient0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661764" comment="libsmbconf-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661765" comment="libsmbconf0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661766" comment="libsmbconf0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661767" comment="libsmbldap-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661768" comment="libsmbldap2-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661769" comment="libsmbldap2-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661770" comment="libtevent-util-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661771" comment="libtevent-util0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661772" comment="libtevent-util0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661773" comment="libwbclient-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661774" comment="libwbclient0-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661775" comment="libwbclient0-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661776" comment="samba-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661777" comment="samba-ad-dc-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661778" comment="samba-ad-dc-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661779" comment="samba-ceph-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661780" comment="samba-client-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661781" comment="samba-client-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661782" comment="samba-core-devel-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661783" comment="samba-doc-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661784" comment="samba-dsdb-modules-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661785" comment="samba-libs-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661786" comment="samba-libs-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661787" comment="samba-libs-python3-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661788" comment="samba-libs-python3-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661789" comment="samba-python3-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661790" comment="samba-test-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661791" comment="samba-winbind-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661792" comment="samba-winbind-32bit-4.11.14+git.313.d4e302805e1-lp152.3.31.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25829</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25829" ref_url="https://www.suse.com/security/cve/CVE-2020-25829" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25829/">CVE-2020-25829</cve>
	<bugzilla href="https://bugzilla.suse.com/1177383">SUSE bug 1177383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615289" comment="pdns-recursor-4.3.5-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862</cve>
	<bugzilla href="https://bugzilla.suse.com/1176909">SUSE bug 1176909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611961" comment="libwireshark13-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611962" comment="libwiretap10-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611963" comment="libwsutil11-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611964" comment="wireshark-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611965" comment="wireshark-devel-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611966" comment="wireshark-ui-qt-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863</cve>
	<bugzilla href="https://bugzilla.suse.com/1176908">SUSE bug 1176908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611961" comment="libwireshark13-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611962" comment="libwiretap10-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611963" comment="libwsutil11-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611964" comment="wireshark-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611965" comment="wireshark-devel-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611966" comment="wireshark-ui-qt-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866</cve>
	<bugzilla href="https://bugzilla.suse.com/1176910">SUSE bug 1176910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611961" comment="libwireshark13-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611962" comment="libwiretap10-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611963" comment="libwsutil11-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611964" comment="wireshark-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611965" comment="wireshark-devel-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611966" comment="wireshark-ui-qt-3.2.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611403" comment="kernel-debug-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611404" comment="kernel-debug-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611405" comment="kernel-default-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611406" comment="kernel-default-base-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611407" comment="kernel-default-base-rebuild-5.3.18-lp152.44.1.lp152.8.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611408" comment="kernel-default-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611409" comment="kernel-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611410" comment="kernel-docs-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611411" comment="kernel-docs-html-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611412" comment="kernel-kvmsmall-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611413" comment="kernel-kvmsmall-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611414" comment="kernel-macros-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611415" comment="kernel-obs-build-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611416" comment="kernel-obs-qa-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611417" comment="kernel-preempt-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611418" comment="kernel-preempt-devel-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611419" comment="kernel-source-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611420" comment="kernel-source-vanilla-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611421" comment="kernel-syms-5.3.18-lp152.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQJZUPSO3MIAIYJBX2VTZETYQSLUJQPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192361">SUSE bug 1192361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612057" comment="libpython2_7-1_0-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612058" comment="libpython2_7-1_0-32bit-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612059" comment="python-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612060" comment="python-32bit-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612061" comment="python-base-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612062" comment="python-base-32bit-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612063" comment="python-curses-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612064" comment="python-demo-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612065" comment="python-devel-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612066" comment="python-doc-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612067" comment="python-doc-pdf-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612068" comment="python-gdbm-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612069" comment="python-idle-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612070" comment="python-tk-2.7.17-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612071" comment="python-xml-2.7.17-lp152.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html" source="SUSE-SU"/>
    <description>
    In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611485" comment="libXvnc-devel-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611486" comment="libXvnc1-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611487" comment="tigervnc-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611488" comment="tigervnc-x11vnc-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611489" comment="xorg-x11-Xvnc-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611490" comment="xorg-x11-Xvnc-java-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611491" comment="xorg-x11-Xvnc-module-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611492" comment="xorg-x11-Xvnc-novnc-1.9.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Y5UAWOTOHQRGI2VNSOUDC2SOAHGJLAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VS7J7DOJY26YMLJIUVHRH7UQFVLGBWIQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CAFSANHH6TU43VSKAJ5JA2EMHSREMKP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632000" comment="python-pyOpenSSL-doc-17.5.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246809" comment="python-pyOpenSSL-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632001" comment="python2-cffi-1.13.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631614" comment="python2-cffi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632002" comment="python2-cryptography-2.8-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238250" comment="python2-cryptography is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632003" comment="python2-pyOpenSSL-17.5.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632010" comment="python2-pyOpenSSL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612436" comment="python2-urllib3-1.24-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009264573" comment="python2-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612437" comment="python2-urllib3-test-1.24-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266833" comment="python2-urllib3-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632004" comment="python3-cffi-1.13.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631618" comment="python3-cffi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632005" comment="python3-cryptography-2.8-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632006" comment="python3-pyOpenSSL-17.5.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177188" comment="python3-pyOpenSSL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612438" comment="python3-urllib3-1.24-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612439" comment="python3-urllib3-test-1.24-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266834" comment="python3-urllib3-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26147</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611498" comment="libproxy-devel-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151761" comment="libproxy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611499" comment="libproxy-sharp-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295954" comment="libproxy-sharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611500" comment="libproxy-tools-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295955" comment="libproxy-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611501" comment="libproxy1-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151762" comment="libproxy1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611502" comment="libproxy1-32bit-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295956" comment="libproxy1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611503" comment="libproxy1-config-gnome3-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151763" comment="libproxy1-config-gnome3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611504" comment="libproxy1-config-kde-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154112" comment="libproxy1-config-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611505" comment="libproxy1-networkmanager-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151765" comment="libproxy1-networkmanager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611506" comment="libproxy1-pacrunner-webkit-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151766" comment="libproxy1-pacrunner-webkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611507" comment="perl-Net-Libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295957" comment="perl-Net-Libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611508" comment="python-libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295958" comment="python-libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611509" comment="python3-libproxy-0.4.15-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295959" comment="python3-libproxy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26164" ref_url="https://www.suse.com/security/cve/CVE-2020-26164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00018.html" source="SUSE-SU"/>
    <description>
    In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26164/">CVE-2020-26164</cve>
	<bugzilla href="https://bugzilla.suse.com/1176268">SUSE bug 1176268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177628">SUSE bug 1177628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605501" comment="kdeconnect-kde-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295059" comment="kdeconnect-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605502" comment="kdeconnect-kde-lang-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295061" comment="kdeconnect-kde-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605503" comment="kdeconnect-kde-zsh-completion-20.04.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295063" comment="kdeconnect-kde-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26215" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26215" ref_url="https://www.suse.com/security/cve/CVE-2020-26215" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T2R7EJ2EM5E7MLFSQTMZGFVV45CYMONR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PBYYAJDZEGK7HWUZML3NOYSMWWR5CVC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OH7ZP2LBWERB26YSK5VYEQ2JEDDJXUOG/" source="SUSE-SU"/>
    <description>
    Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26215/">CVE-2020-26215</cve>
	<bugzilla href="https://bugzilla.suse.com/1180458">SUSE bug 1180458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613030" comment="jupyter-notebook-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340862" comment="jupyter-notebook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613031" comment="jupyter-notebook-doc-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340863" comment="jupyter-notebook-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613032" comment="jupyter-notebook-lang-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340864" comment="jupyter-notebook-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613033" comment="jupyter-notebook-latex-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340865" comment="jupyter-notebook-latex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613034" comment="python2-notebook-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340867" comment="python2-notebook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613035" comment="python2-notebook-lang-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340868" comment="python2-notebook-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613036" comment="python3-notebook-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340869" comment="python3-notebook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613037" comment="python3-notebook-lang-5.7.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340870" comment="python3-notebook-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26217" ref_url="https://www.suse.com/security/cve/CVE-2020-26217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTO6QRFLVKVHOYBP6VLJP4KZXZFZSKET/" source="SUSE-SU"/>
    <description>
    XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26217/">CVE-2020-26217</cve>
	<bugzilla href="https://bugzilla.suse.com/1180994">SUSE bug 1180994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612945" comment="xstream-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612946" comment="xstream-benchmark-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612947" comment="xstream-javadoc-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612948" comment="xstream-parent-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26247" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLEJCRYIVSTKE34ZJIXITKLZOOKOAMWQ/" source="SUSE-SU"/>
    <description>
    Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247</cve>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613010" comment="ruby2.5-rubygem-nokogiri-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342874" comment="ruby2.5-rubygem-nokogiri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613011" comment="ruby2.5-rubygem-nokogiri-doc-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342875" comment="ruby2.5-rubygem-nokogiri-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613012" comment="ruby2.5-rubygem-nokogiri-testsuite-1.8.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342876" comment="ruby2.5-rubygem-nokogiri-testsuite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26258</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26258" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26258" ref_url="https://www.suse.com/security/cve/CVE-2020-26258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTO6QRFLVKVHOYBP6VLJP4KZXZFZSKET/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26258/">CVE-2020-26258</cve>
	<bugzilla href="https://bugzilla.suse.com/1180146">SUSE bug 1180146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612945" comment="xstream-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612946" comment="xstream-benchmark-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612947" comment="xstream-javadoc-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612948" comment="xstream-parent-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26259</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26259" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26259" ref_url="https://www.suse.com/security/cve/CVE-2020-26259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTO6QRFLVKVHOYBP6VLJP4KZXZFZSKET/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26259/">CVE-2020-26259</cve>
	<bugzilla href="https://bugzilla.suse.com/1180145">SUSE bug 1180145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612945" comment="xstream-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612946" comment="xstream-benchmark-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612947" comment="xstream-javadoc-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612948" comment="xstream-parent-1.4.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418</cve>
	<bugzilla href="https://bugzilla.suse.com/1179930">SUSE bug 1179930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419</cve>
	<bugzilla href="https://bugzilla.suse.com/1179931">SUSE bug 1179931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420</cve>
	<bugzilla href="https://bugzilla.suse.com/1179932">SUSE bug 1179932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421</cve>
	<bugzilla href="https://bugzilla.suse.com/1179933">SUSE bug 1179933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Buffer overflow in QUIC dissector in Wireshark 3.4.0 to 3.4.1 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422</cve>
	<bugzilla href="https://bugzilla.suse.com/1180232">SUSE bug 1180232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570</cve>
	<bugzilla href="https://bugzilla.suse.com/1177364">SUSE bug 1177364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571</cve>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26572</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26572" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JELZKRVEJGYE74DM3GTNHNTVZBQHK5DJ/" source="SUSE-SU"/>
    <description>
    The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572</cve>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179291">SUSE bug 1179291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614180" comment="opensc-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614181" comment="opensc-32bit-0.19.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239136" comment="opensc-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575</cve>
	<bugzilla href="https://bugzilla.suse.com/1177406">SUSE bug 1177406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178290">SUSE bug 1178290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612176" comment="libwireshark13-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612177" comment="libwiretap10-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612178" comment="libwsutil11-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612179" comment="wireshark-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612180" comment="wireshark-devel-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612181" comment="wireshark-ui-qt-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26664" ref_url="https://www.suse.com/security/cve/CVE-2020-26664" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD6C4CTIQTZF237437FPGD5AIRV33TET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIZQCEFFNAB3CPF433JKRUT3ZM2EDM33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYGQU4F6PPW4XHK4LTESKSQ2CPHZS3QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJCT5WYFJXXNRF5NSC7LOIHN7BD5UKVV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0691-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NFAANEHTTDAXZIGCXPSKGYDFZDQ3HMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHKDVKJAYUS66PEMKU2REXIBZDZ6GFW/" source="SUSE-SU"/>
    <description>
    A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media player 3.0.11 allows attackers to trigger a heap-based buffer overflow via a crafted .mkv file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26664/">CVE-2020-26664</cve>
	<bugzilla href="https://bugzilla.suse.com/1180755">SUSE bug 1180755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614570" comment="libvlc5-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614571" comment="libvlccore9-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614572" comment="vlc-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614573" comment="vlc-codec-gstreamer-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614574" comment="vlc-devel-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614575" comment="vlc-jack-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614576" comment="vlc-lang-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614577" comment="vlc-noX-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614578" comment="vlc-opencv-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614579" comment="vlc-qt-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614580" comment="vlc-vdpau-3.0.13-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26682" ref_url="https://www.suse.com/security/cve/CVE-2020-26682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008546.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0472-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGQ6Q6RCVRPDWCXGFBVQDFSYE4QKBYMU/" source="SUSE-SU"/>
    <description>
    In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26682/">CVE-2020-26682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177862">SUSE bug 1177862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613856" comment="libass-devel-0.14.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153843" comment="libass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613857" comment="libass9-0.14.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177230" comment="libass9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613858" comment="libass9-32bit-0.14.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348105" comment="libass9-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26934" ref_url="https://www.suse.com/security/cve/CVE-2020-26934" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26934/">CVE-2020-26934</cve>
	<bugzilla href="https://bugzilla.suse.com/1177561">SUSE bug 1177561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615770" comment="phpMyAdmin-4.9.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26935" ref_url="https://www.suse.com/security/cve/CVE-2020-26935" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-26935/">CVE-2020-26935</cve>
	<bugzilla href="https://bugzilla.suse.com/1177562">SUSE bug 1177562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615770" comment="phpMyAdmin-4.9.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26950</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AMXWTXD2SXOW4LKFZ4XU2QOQYXVDMOL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6SUAYN7JWUE2A26Q6GJ5JMMXTKYHZSL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMGXD75QZYXYUNEY2A43RG5HRUA6C7BT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3SMMQGPABLYJBCFGYFKI43SSCXS244L/" source="SUSE-SU"/>
    <description>
    In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox &lt; 82.0.3, Firefox ESR &lt; 78.4.1, and Thunderbird &lt; 78.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178611">SUSE bug 1178611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612035" comment="MozillaFirefox-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612036" comment="MozillaFirefox-branding-upstream-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612037" comment="MozillaFirefox-buildsymbols-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612038" comment="MozillaFirefox-devel-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612039" comment="MozillaFirefox-translations-common-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612040" comment="MozillaFirefox-translations-other-78.4.1-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612126" comment="MozillaThunderbird-78.4.2-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612127" comment="MozillaThunderbird-translations-common-78.4.2-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612128" comment="MozillaThunderbird-translations-other-78.4.2-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612517" comment="MozillaFirefox-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612518" comment="MozillaFirefox-branding-upstream-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612519" comment="MozillaFirefox-buildsymbols-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612520" comment="MozillaFirefox-devel-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612521" comment="MozillaFirefox-translations-common-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612522" comment="MozillaFirefox-translations-other-78.5.0-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612239" comment="MozillaThunderbird-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612240" comment="MozillaThunderbird-translations-common-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612241" comment="MozillaThunderbird-translations-other-78.5.0-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox &lt; 84.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613004" comment="MozillaFirefox-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613005" comment="MozillaFirefox-branding-upstream-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613006" comment="MozillaFirefox-buildsymbols-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613007" comment="MozillaFirefox-devel-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613008" comment="MozillaFirefox-translations-common-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613009" comment="MozillaFirefox-translations-other-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27153</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27153" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00036.html" source="SUSE-SU"/>
    <description>
    In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611953" comment="bluez-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611954" comment="bluez-auto-enable-devices-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611955" comment="bluez-cups-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611956" comment="bluez-devel-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611957" comment="bluez-devel-32bit-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611958" comment="bluez-test-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611959" comment="libbluetooth3-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611960" comment="libbluetooth3-32bit-5.48-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27170</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27171</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27208" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27208" ref_url="https://www.suse.com/security/cve/CVE-2020-27208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KVSCA7DKULXER7BGQ3YJN34AY5RPCIU5/" source="SUSE-SU"/>
    <description>
    The flash read-out protection (RDP) level is not enforced during the device initialization phase of the SoloKeys Solo 4.0.0 &amp; Somu and the Nitrokey FIDO2 token. This allows an adversary to downgrade the RDP level and access secrets such as private ECC keys from SRAM via the debug interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27208/">CVE-2020-27208</cve>
	<bugzilla href="https://bugzilla.suse.com/1186848">SUSE bug 1186848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624528" comment="solo-udev-4.1.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624529" comment="solo-udev is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27218" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27218" ref_url="https://www.suse.com/security/cve/CVE-2020-27218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V4MZVOK35CIZLLLRF4FF6YZSQWFZO7UA/" source="SUSE-SU"/>
    <description>
    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27218/">CVE-2020-27218</cve>
	<bugzilla href="https://bugzilla.suse.com/1179727">SUSE bug 1179727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612897" comment="jetty-annotations-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340693" comment="jetty-annotations is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612898" comment="jetty-client-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340694" comment="jetty-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612899" comment="jetty-continuation-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340695" comment="jetty-continuation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612900" comment="jetty-http-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340696" comment="jetty-http is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612901" comment="jetty-io-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340697" comment="jetty-io is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612902" comment="jetty-jaas-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340698" comment="jetty-jaas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612903" comment="jetty-javax-websocket-client-impl-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340699" comment="jetty-javax-websocket-client-impl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612904" comment="jetty-javax-websocket-server-impl-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340700" comment="jetty-javax-websocket-server-impl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612905" comment="jetty-jmx-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340701" comment="jetty-jmx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612906" comment="jetty-jndi-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340702" comment="jetty-jndi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612907" comment="jetty-jsp-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340703" comment="jetty-jsp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612908" comment="jetty-minimal-javadoc-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340705" comment="jetty-minimal-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612909" comment="jetty-openid-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340706" comment="jetty-openid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612910" comment="jetty-plus-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340707" comment="jetty-plus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612911" comment="jetty-proxy-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340708" comment="jetty-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612912" comment="jetty-security-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340709" comment="jetty-security is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612913" comment="jetty-server-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340710" comment="jetty-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612914" comment="jetty-servlet-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340711" comment="jetty-servlet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612915" comment="jetty-util-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340712" comment="jetty-util is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612916" comment="jetty-util-ajax-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340713" comment="jetty-util-ajax is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612917" comment="jetty-webapp-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340714" comment="jetty-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612918" comment="jetty-websocket-api-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340716" comment="jetty-websocket-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612919" comment="jetty-websocket-client-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340717" comment="jetty-websocket-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612920" comment="jetty-websocket-common-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340718" comment="jetty-websocket-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612921" comment="jetty-websocket-javadoc-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340719" comment="jetty-websocket-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612922" comment="jetty-websocket-server-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340720" comment="jetty-websocket-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612923" comment="jetty-websocket-servlet-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340721" comment="jetty-websocket-servlet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612924" comment="jetty-xml-9.4.35-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340722" comment="jetty-xml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27225" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27225" ref_url="https://www.suse.com/security/cve/CVE-2020-27225" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFMJOYKYZTYC75UCIIQQRAD674LFJI3L/" source="SUSE-SU"/>
    <description>
    In versions 4.18 and earlier of the Eclipse Platform, the Help Subsystem does not authenticate active help requests to the local help web server, allowing an unauthenticated local attacker to issue active help commands to the associated Eclipse Platform process or Eclipse Rich Client Platform process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-27225/">CVE-2020-27225</cve>
	<bugzilla href="https://bugzilla.suse.com/1183728">SUSE bug 1183728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613909" comment="eclipse-contributor-tools-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348321" comment="eclipse-contributor-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613910" comment="eclipse-contributor-tools-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348322" comment="eclipse-contributor-tools-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613911" comment="eclipse-equinox-osgi-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348323" comment="eclipse-equinox-osgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613912" comment="eclipse-equinox-osgi-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348324" comment="eclipse-equinox-osgi-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613913" comment="eclipse-jdt-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348325" comment="eclipse-jdt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613914" comment="eclipse-jdt-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348326" comment="eclipse-jdt-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613915" comment="eclipse-p2-discovery-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348327" comment="eclipse-p2-discovery is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613916" comment="eclipse-p2-discovery-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348328" comment="eclipse-p2-discovery-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613917" comment="eclipse-pde-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348329" comment="eclipse-pde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613918" comment="eclipse-pde-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348330" comment="eclipse-pde-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613919" comment="eclipse-platform-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348331" comment="eclipse-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613920" comment="eclipse-platform-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348332" comment="eclipse-platform-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613921" comment="eclipse-swt-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348333" comment="eclipse-swt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613922" comment="eclipse-swt-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348334" comment="eclipse-swt-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613923" comment="eclipse-tests-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348335" comment="eclipse-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613924" comment="eclipse-tests-bootstrap-4.9.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348336" comment="eclipse-tests-bootstrap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27304</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27304" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27304" ref_url="https://www.suse.com/security/cve/CVE-2020-27304" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1424-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJTZUANR73SYTZDQ6GMWGRR5O4MCEJA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
    <description>
    The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-27304/">CVE-2020-27304</cve>
	<bugzilla href="https://bugzilla.suse.com/1191938">SUSE bug 1191938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653854" comment="civetweb-1.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653861" comment="civetweb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653855" comment="civetweb-devel-1.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653862" comment="civetweb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653856" comment="libcivetweb-cpp1_15_0-1.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653863" comment="libcivetweb-cpp1_15_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653857" comment="libcivetweb1_15_0-1.15-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653864" comment="libcivetweb1_15_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27347" ref_url="https://www.suse.com/security/cve/CVE-2020-27347" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00020.html" source="SUSE-SU"/>
    <description>
    In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27347/">CVE-2020-27347</cve>
	<bugzilla href="https://bugzilla.suse.com/1178263">SUSE bug 1178263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178316">SUSE bug 1178316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615251" comment="tmux-3.1c-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298611" comment="tmux is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGPRC7JUH4MGYAWLWPLVA5TLIICGY75B/" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611967" comment="ImageMagick-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611968" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611969" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611970" comment="ImageMagick-devel-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611971" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611972" comment="ImageMagick-doc-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611973" comment="ImageMagick-extra-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611974" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611975" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611976" comment="libMagick++-devel-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611977" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611978" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611979" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611980" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611981" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611982" comment="perl-PerlMagick-7.0.7.34-lp152.12.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27616" ref_url="https://www.suse.com/security/cve/CVE-2020-27616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27616/">CVE-2020-27616</cve>
	<bugzilla href="https://bugzilla.suse.com/1178400">SUSE bug 1178400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27617</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617</cve>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618</cve>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613426" comment="glibc-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613427" comment="glibc-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613428" comment="glibc-devel-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613429" comment="glibc-devel-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613430" comment="glibc-devel-static-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613431" comment="glibc-devel-static-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613432" comment="glibc-extra-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613433" comment="glibc-html-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613434" comment="glibc-i18ndata-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613435" comment="glibc-info-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613436" comment="glibc-locale-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613437" comment="glibc-locale-base-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613438" comment="glibc-locale-base-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613439" comment="glibc-profile-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613440" comment="glibc-profile-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613441" comment="glibc-utils-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613442" comment="glibc-utils-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613443" comment="nscd-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180254">SUSE bug 1180254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193386">SUSE bug 1193386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612376" comment="xen-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612377" comment="xen-devel-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612378" comment="xen-doc-html-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612379" comment="xen-libs-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612380" comment="xen-libs-32bit-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612381" comment="xen-tools-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612382" comment="xen-tools-domU-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612383" comment="xen-tools-xendomains-wait-disk-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612376" comment="xen-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612377" comment="xen-devel-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612378" comment="xen-doc-html-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612379" comment="xen-libs-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612380" comment="xen-libs-32bit-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612381" comment="xen-tools-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612382" comment="xen-tools-domU-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612383" comment="xen-tools-xendomains-wait-disk-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612376" comment="xen-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612377" comment="xen-devel-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612378" comment="xen-doc-html-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612379" comment="xen-libs-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612380" comment="xen-libs-32bit-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612381" comment="xen-tools-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612382" comment="xen-tools-domU-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612383" comment="xen-tools-xendomains-wait-disk-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611782" comment="xen-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611783" comment="xen-devel-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611784" comment="xen-doc-html-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611785" comment="xen-libs-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611786" comment="xen-libs-32bit-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611787" comment="xen-tools-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611788" comment="xen-tools-domU-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611789" comment="xen-tools-xendomains-wait-disk-4.13.1_10-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612376" comment="xen-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612377" comment="xen-devel-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612378" comment="xen-doc-html-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612379" comment="xen-libs-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612380" comment="xen-libs-32bit-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612381" comment="xen-tools-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612382" comment="xen-tools-domU-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612383" comment="xen-tools-xendomains-wait-disk-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27745" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27745" ref_url="https://www.suse.com/security/cve/CVE-2020-27745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK5TOFTMMMLNW5U6MVRZ2CYJN3MTJQ3H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6EPEASTWK66PMT44C2GSQXHCPXCOLCZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNYAPPFTPC34OZ2Z2DMX2VNAUGZWQ5LN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J42YJUAKDUG5O7YONJOQ2TWDUORC5MXP/" source="SUSE-SU"/>
    <description>
    Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27745/">CVE-2020-27745</cve>
	<bugzilla href="https://bugzilla.suse.com/1178890">SUSE bug 1178890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612129" comment="libnss_slurm2-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300283" comment="libnss_slurm2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612130" comment="libpmi0-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615225" comment="libslurm33-18.08.9-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612131" comment="libslurm35-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300284" comment="libslurm35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612132" comment="perl-slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612133" comment="slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612134" comment="slurm-auth-none-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612135" comment="slurm-config-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612136" comment="slurm-config-man-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612137" comment="slurm-cray-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612138" comment="slurm-devel-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612139" comment="slurm-doc-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612140" comment="slurm-hdf5-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612141" comment="slurm-lua-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612142" comment="slurm-munge-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612143" comment="slurm-node-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612144" comment="slurm-openlava-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612145" comment="slurm-pam_slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612146" comment="slurm-plugins-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612147" comment="slurm-rest-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300285" comment="slurm-rest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612148" comment="slurm-seff-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612149" comment="slurm-sjstat-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612150" comment="slurm-slurmdbd-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612151" comment="slurm-sql-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612152" comment="slurm-sview-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612153" comment="slurm-torque-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612154" comment="slurm-webdoc-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27746" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27746" ref_url="https://www.suse.com/security/cve/CVE-2020-27746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK5TOFTMMMLNW5U6MVRZ2CYJN3MTJQ3H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6EPEASTWK66PMT44C2GSQXHCPXCOLCZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNYAPPFTPC34OZ2Z2DMX2VNAUGZWQ5LN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J42YJUAKDUG5O7YONJOQ2TWDUORC5MXP/" source="SUSE-SU"/>
    <description>
    Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27746/">CVE-2020-27746</cve>
	<bugzilla href="https://bugzilla.suse.com/1178891">SUSE bug 1178891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612129" comment="libnss_slurm2-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300283" comment="libnss_slurm2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612130" comment="libpmi0-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615225" comment="libslurm33-18.08.9-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612131" comment="libslurm35-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300284" comment="libslurm35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612132" comment="perl-slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612133" comment="slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612134" comment="slurm-auth-none-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612135" comment="slurm-config-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612136" comment="slurm-config-man-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612137" comment="slurm-cray-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612138" comment="slurm-devel-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612139" comment="slurm-doc-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612140" comment="slurm-hdf5-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612141" comment="slurm-lua-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612142" comment="slurm-munge-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612143" comment="slurm-node-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612144" comment="slurm-openlava-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612145" comment="slurm-pam_slurm-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612146" comment="slurm-plugins-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612147" comment="slurm-rest-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300285" comment="slurm-rest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612148" comment="slurm-seff-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612149" comment="slurm-sjstat-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612150" comment="slurm-slurmdbd-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612151" comment="slurm-sql-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612152" comment="slurm-sview-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612153" comment="slurm-torque-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612154" comment="slurm-webdoc-20.02.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27754</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<bugzilla href="https://bugzilla.suse.com/1179221">SUSE bug 1179221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<bugzilla href="https://bugzilla.suse.com/1179276">SUSE bug 1179276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27774</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27775</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VIGY47XAX5FSNNMOBHOKUCFSJHIH4RII/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6DKXUZUWGIN6CZATVDSZF3XYMJUH7LE/" source="SUSE-SU"/>
    <description>
    User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781</cve>
	<bugzilla href="https://bugzilla.suse.com/1179802">SUSE bug 1179802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180155">SUSE bug 1180155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612532" comment="ceph-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612533" comment="ceph-base-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612534" comment="ceph-common-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612535" comment="ceph-fuse-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612536" comment="ceph-grafana-dashboards-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612537" comment="ceph-immutable-object-cache-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612538" comment="ceph-mds-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612539" comment="ceph-mgr-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612540" comment="ceph-mgr-cephadm-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612541" comment="ceph-mgr-dashboard-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612542" comment="ceph-mgr-diskprediction-cloud-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612543" comment="ceph-mgr-diskprediction-local-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612544" comment="ceph-mgr-k8sevents-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612545" comment="ceph-mgr-modules-core-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612546" comment="ceph-mgr-rook-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612547" comment="ceph-mon-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612548" comment="ceph-osd-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612549" comment="ceph-prometheus-alerts-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612550" comment="ceph-radosgw-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612551" comment="ceph-test-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612552" comment="cephadm-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612553" comment="cephfs-shell-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612554" comment="libcephfs-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612555" comment="libcephfs2-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612556" comment="librados-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612557" comment="librados2-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612558" comment="libradospp-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612559" comment="librbd-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612560" comment="librbd1-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612561" comment="librgw-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612562" comment="librgw2-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612563" comment="python3-ceph-argparse-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612564" comment="python3-ceph-common-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612565" comment="python3-cephfs-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612566" comment="python3-rados-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612567" comment="python3-rbd-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612568" comment="python3-rgw-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612569" comment="rados-objclass-devel-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612570" comment="rbd-fuse-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612571" comment="rbd-mirror-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612572" comment="rbd-nbd-15.2.8.80+g1f4b6229ca-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179458">SUSE bug 1179458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27818</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27818" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27818" ref_url="https://www.suse.com/security/cve/CVE-2020-27818" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6X67BQ55SUAPPGYOKAMOSKREWWBB3IML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNGY4RQOIMXS6TTD3ACRQAMK2RAWPXG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2220-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NV3VWVURXABVRUNQHZKR6NMGC57TGOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2QIGVX2RVTJFGI36POZTZGDGLBTYHX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27818/">CVE-2020-27818</cve>
	<bugzilla href="https://bugzilla.suse.com/1179528">SUSE bug 1179528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612397" comment="pngcheck-2.3.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338019" comment="pngcheck is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27819</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27819" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27819" ref_url="https://www.suse.com/security/cve/CVE-2020-27819" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6PICHOKDDWFUM2A34VZUNW6XR4NUUPC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxls before and including 1.6.1 when reading Microsoft Excel files. A NULL pointer dereference vulnerability exists when parsing XLS cells in libxls/xls2csv.c:199. It could allow a remote attacker to cause a denial of service via crafted XLS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27819/">CVE-2020-27819</cve>
	<bugzilla href="https://bugzilla.suse.com/1179532">SUSE bug 1179532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614801" comment="libxls-devel-1.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476345" comment="libxls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614802" comment="libxls-tools-1.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476346" comment="libxls-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614803" comment="libxlsreader8-1.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476347" comment="libxlsreader8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27821" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821</cve>
	<bugzilla href="https://bugzilla.suse.com/1179686">SUSE bug 1179686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27825</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27827</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008270.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBHQUGIHMXL62CWXH7ZTZ3HUSFCNG7DW/" source="SUSE-SU"/>
    <description>
    A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613013" comment="libopenvswitch-2_13-0-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342878" comment="libopenvswitch-2_13-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613014" comment="libovn-20_03-0-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342879" comment="libovn-20_03-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613015" comment="openvswitch-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162414" comment="openvswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613016" comment="openvswitch-devel-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162415" comment="openvswitch-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613017" comment="openvswitch-doc-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342880" comment="openvswitch-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613018" comment="openvswitch-ipsec-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342881" comment="openvswitch-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613019" comment="openvswitch-pki-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162421" comment="openvswitch-pki is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613020" comment="openvswitch-test-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162422" comment="openvswitch-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613021" comment="openvswitch-vtep-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162423" comment="openvswitch-vtep is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613022" comment="ovn-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342882" comment="ovn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613023" comment="ovn-central-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342883" comment="ovn-central is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613024" comment="ovn-devel-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342884" comment="ovn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613025" comment="ovn-doc-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342885" comment="ovn-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613026" comment="ovn-docker-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342886" comment="ovn-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613027" comment="ovn-host-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342887" comment="ovn-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613028" comment="ovn-vtep-20.03.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342888" comment="ovn-vtep is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613029" comment="python3-ovs-2.13.2-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342889" comment="python3-ovs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27828</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27828" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ZF7VRY24X2GVC7MCP6MQKQBRKCSJ2A/" source="SUSE-SU"/>
    <description>
    There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613188" comment="jasper-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613189" comment="libjasper-devel-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613190" comment="libjasper4-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613191" comment="libjasper4-32bit-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27830</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27835</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
    <description>
    A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27839" ref_url="https://www.suse.com/security/cve/CVE-2020-27839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNSWJAZ3F5NDFCU63NISQ76JHRYOI25U/" source="SUSE-SU"/>
    <description>
    A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27839/">CVE-2020-27839</cve>
	<bugzilla href="https://bugzilla.suse.com/1179997">SUSE bug 1179997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614109" comment="ceph-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614110" comment="ceph-base-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614111" comment="ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614112" comment="ceph-fuse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614113" comment="ceph-grafana-dashboards-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614114" comment="ceph-immutable-object-cache-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614115" comment="ceph-mds-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614116" comment="ceph-mgr-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614117" comment="ceph-mgr-cephadm-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614118" comment="ceph-mgr-dashboard-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614119" comment="ceph-mgr-diskprediction-cloud-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614120" comment="ceph-mgr-diskprediction-local-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614121" comment="ceph-mgr-k8sevents-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614122" comment="ceph-mgr-modules-core-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614123" comment="ceph-mgr-rook-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614124" comment="ceph-mon-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614125" comment="ceph-osd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614126" comment="ceph-prometheus-alerts-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614127" comment="ceph-radosgw-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614128" comment="ceph-test-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614129" comment="cephadm-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614130" comment="cephfs-shell-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614131" comment="libcephfs-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614132" comment="libcephfs2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614133" comment="librados-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614134" comment="librados2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614135" comment="libradospp-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614136" comment="librbd-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614137" comment="librbd1-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614138" comment="librgw-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614139" comment="librgw2-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614140" comment="python3-ceph-argparse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614141" comment="python3-ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614142" comment="python3-cephfs-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614143" comment="python3-rados-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614144" comment="python3-rbd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614145" comment="python3-rgw-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614146" comment="rados-objclass-devel-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614147" comment="rbd-fuse-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614148" comment="rbd-mirror-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614149" comment="rbd-nbd-15.2.9.83+g4275378de0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0469-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLNA72I7E6KKMIQOHXHYRPDYGMW5KH4K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614354" comment="ctdb-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614355" comment="ctdb-pcp-pmda-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614356" comment="ctdb-tests-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613830" comment="ldb-tools-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614357" comment="libdcerpc-binding0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614358" comment="libdcerpc-binding0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614359" comment="libdcerpc-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614360" comment="libdcerpc-samr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614361" comment="libdcerpc-samr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614362" comment="libdcerpc-samr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614363" comment="libdcerpc0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614364" comment="libdcerpc0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613831" comment="libldb-devel-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613832" comment="libldb2-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613833" comment="libldb2-32bit-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614365" comment="libndr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614366" comment="libndr-krb5pac-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614367" comment="libndr-krb5pac0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614368" comment="libndr-krb5pac0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614369" comment="libndr-nbt-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614370" comment="libndr-nbt0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614371" comment="libndr-nbt0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614372" comment="libndr-standard-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614373" comment="libndr-standard0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614374" comment="libndr-standard0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614375" comment="libndr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614376" comment="libndr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614377" comment="libnetapi-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614378" comment="libnetapi-devel-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614379" comment="libnetapi0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614380" comment="libnetapi0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614381" comment="libsamba-credentials-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614382" comment="libsamba-credentials0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614383" comment="libsamba-credentials0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614384" comment="libsamba-errors-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614385" comment="libsamba-errors0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614386" comment="libsamba-errors0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614387" comment="libsamba-hostconfig-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614388" comment="libsamba-hostconfig0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614389" comment="libsamba-hostconfig0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614390" comment="libsamba-passdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614391" comment="libsamba-passdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614392" comment="libsamba-passdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614393" comment="libsamba-policy-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614394" comment="libsamba-policy-python3-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614395" comment="libsamba-policy0-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614396" comment="libsamba-policy0-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614397" comment="libsamba-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614398" comment="libsamba-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614399" comment="libsamba-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614400" comment="libsamdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614401" comment="libsamdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614402" comment="libsamdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614403" comment="libsmbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614404" comment="libsmbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614405" comment="libsmbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614406" comment="libsmbconf-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614407" comment="libsmbconf0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614408" comment="libsmbconf0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614409" comment="libsmbldap-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614410" comment="libsmbldap2-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614411" comment="libsmbldap2-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614412" comment="libtevent-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614413" comment="libtevent-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614414" comment="libtevent-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614415" comment="libwbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614416" comment="libwbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614417" comment="libwbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613834" comment="python3-ldb-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613835" comment="python3-ldb-32bit-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613836" comment="python3-ldb-devel-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614418" comment="samba-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614419" comment="samba-ad-dc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614420" comment="samba-ad-dc-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614421" comment="samba-ceph-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614422" comment="samba-client-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614423" comment="samba-client-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614424" comment="samba-core-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614425" comment="samba-doc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614426" comment="samba-dsdb-modules-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614427" comment="samba-libs-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614428" comment="samba-libs-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614429" comment="samba-libs-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614430" comment="samba-libs-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614431" comment="samba-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614432" comment="samba-test-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614433" comment="samba-winbind-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614434" comment="samba-winbind-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27844" ref_url="https://www.suse.com/security/cve/CVE-2020-27844" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. This flaw allows an attacker to provide crafted input to openjpeg during conversion and encoding, causing an out-of-bounds write. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27844/">CVE-2020-27844</cve>
	<bugzilla href="https://bugzilla.suse.com/1180045">SUSE bug 1180045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28007</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28007" ref_url="https://www.suse.com/security/cve/CVE-2020-28007" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28007/">CVE-2020-28007</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28008" ref_url="https://www.suse.com/security/cve/CVE-2020-28008" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28008/">CVE-2020-28008</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28009" ref_url="https://www.suse.com/security/cve/CVE-2020-28009" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28009/">CVE-2020-28009</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28010" ref_url="https://www.suse.com/security/cve/CVE-2020-28010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28010/">CVE-2020-28010</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28011" ref_url="https://www.suse.com/security/cve/CVE-2020-28011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28011/">CVE-2020-28011</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28012" ref_url="https://www.suse.com/security/cve/CVE-2020-28012" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28012/">CVE-2020-28012</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28013" ref_url="https://www.suse.com/security/cve/CVE-2020-28013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28013/">CVE-2020-28013</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28014</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28014" ref_url="https://www.suse.com/security/cve/CVE-2020-28014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28014/">CVE-2020-28014</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28015" ref_url="https://www.suse.com/security/cve/CVE-2020-28015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28015/">CVE-2020-28015</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28016" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28016" ref_url="https://www.suse.com/security/cve/CVE-2020-28016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28016/">CVE-2020-28016</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28017" ref_url="https://www.suse.com/security/cve/CVE-2020-28017" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28017/">CVE-2020-28017</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28018" ref_url="https://www.suse.com/security/cve/CVE-2020-28018" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28018/">CVE-2020-28018</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28019" ref_url="https://www.suse.com/security/cve/CVE-2020-28019" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28019/">CVE-2020-28019</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28020" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28020" ref_url="https://www.suse.com/security/cve/CVE-2020-28020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28020/">CVE-2020-28020</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28021" ref_url="https://www.suse.com/security/cve/CVE-2020-28021" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28021/">CVE-2020-28021</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28022" ref_url="https://www.suse.com/security/cve/CVE-2020-28022" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28022/">CVE-2020-28022</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28023" ref_url="https://www.suse.com/security/cve/CVE-2020-28023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28023/">CVE-2020-28023</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28024" ref_url="https://www.suse.com/security/cve/CVE-2020-28024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28024/">CVE-2020-28024</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28025</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28025" ref_url="https://www.suse.com/security/cve/CVE-2020-28025" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig-&gt;bodyhash.len and b-&gt;bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28025/">CVE-2020-28025</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28026" ref_url="https://www.suse.com/security/cve/CVE-2020-28026" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIR4NXSH3ADTQNJZHHL5EVSFNXRGTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FZPX7R5ELKQM2EW7W2JYZ7EFIIDTT4E/" source="SUSE-SU"/>
    <description>
    Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28026/">CVE-2020-28026</cve>
	<bugzilla href="https://bugzilla.suse.com/1185631">SUSE bug 1185631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614561" comment="exim-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614562" comment="eximon-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614563" comment="eximstats-html-4.94.2-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030</cve>
	<bugzilla href="https://bugzilla.suse.com/1178291">SUSE bug 1178291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612176" comment="libwireshark13-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612177" comment="libwiretap10-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612178" comment="libwsutil11-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612179" comment="wireshark-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612180" comment="wireshark-devel-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612181" comment="wireshark-ui-qt-3.2.8-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28049" ref_url="https://www.suse.com/security/cve/CVE-2020-28049" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TO7JRTPGBU4JZ3MOLPKGZUUXQGICWL4Z/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-28049/">CVE-2020-28049</cve>
	<bugzilla href="https://bugzilla.suse.com/1177201">SUSE bug 1177201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606083" comment="sddm-0.18.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152215" comment="sddm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606084" comment="sddm-branding-openSUSE-0.18.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152216" comment="sddm-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606085" comment="sddm-branding-upstream-0.18.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231933" comment="sddm-branding-upstream is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CMUQ7G43OCIKDTP2ILYUJLUD37RPPA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6PZTATZYCUQYKCJ6QBS7JJHNWPXIDNL/" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612157" comment="krb5-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612158" comment="krb5-32bit-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612159" comment="krb5-client-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612160" comment="krb5-devel-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612161" comment="krb5-devel-32bit-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612162" comment="krb5-mini-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612163" comment="krb5-mini-devel-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612164" comment="krb5-plugin-kdb-ldap-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612165" comment="krb5-plugin-preauth-otp-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612166" comment="krb5-plugin-preauth-pkinit-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612167" comment="krb5-server-1.16.3-lp152.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28200</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28200" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOZSH4SD3B27NBLCL3T2IO4EVB6AMFYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLFYZS4WAYE6TU4PO3V2JUI7DPQEK73I/" source="SUSE-SU"/>
    <description>
    The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200</cve>
	<bugzilla href="https://bugzilla.suse.com/1187420">SUSE bug 1187420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632480" comment="dovecot23-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632481" comment="dovecot23-backend-mysql-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632482" comment="dovecot23-backend-pgsql-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632483" comment="dovecot23-backend-sqlite-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632484" comment="dovecot23-devel-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632485" comment="dovecot23-fts-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632486" comment="dovecot23-fts-lucene-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632487" comment="dovecot23-fts-solr-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632488" comment="dovecot23-fts-squat-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28243</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362</cve>
	<bugzilla href="https://bugzilla.suse.com/1178750">SUSE bug 1178750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612172" comment="go1.14-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612173" comment="go1.14-doc-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612174" comment="go1.14-race-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612247" comment="go1.15-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612248" comment="go1.15-doc-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612249" comment="go1.15-race-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28366</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366</cve>
	<bugzilla href="https://bugzilla.suse.com/1178753">SUSE bug 1178753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612172" comment="go1.14-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612173" comment="go1.14-doc-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612174" comment="go1.14-race-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612247" comment="go1.15-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612248" comment="go1.15-doc-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612249" comment="go1.15-race-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367</cve>
	<bugzilla href="https://bugzilla.suse.com/1178752">SUSE bug 1178752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612172" comment="go1.14-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612173" comment="go1.14-doc-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612174" comment="go1.14-race-1.14.12-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612247" comment="go1.15-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612248" comment="go1.15-doc-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612249" comment="go1.15-race-1.15.5-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHV4EWRFFS4A6PZIGBZQ2KTQFUWF52LY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4ZVHN5CZEV5SEFNJFHEB2GTN3V6YCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612376" comment="xen-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612377" comment="xen-devel-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612378" comment="xen-doc-html-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612379" comment="xen-libs-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612380" comment="xen-libs-32bit-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612381" comment="xen-tools-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612382" comment="xen-tools-domU-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612383" comment="xen-tools-xendomains-wait-disk-4.13.2_04-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28463</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28463" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28463" ref_url="https://www.suse.com/security/cve/CVE-2020-28463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKQHRG3VVE7T4B4XL3YGBVUD72DQRRHC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E52AKOBLZLRVRGNROGFREOUCWFZYLKPT/" source="SUSE-SU"/>
    <description>
    All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes &amp; trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -&gt; odyssey -&gt; dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject &lt;img src="http://127.0.0.1:5000" valign="top"/&gt; 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-28463/">CVE-2020-28463</cve>
	<bugzilla href="https://bugzilla.suse.com/1182503">SUSE bug 1182503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630895" comment="python2-reportlab-3.4.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277408" comment="python2-reportlab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630896" comment="python3-reportlab-3.4.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277409" comment="python3-reportlab is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28473</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28473" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28473" ref_url="https://www.suse.com/security/cve/CVE-2020-28473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH4G4ACMTOHQQPWHAFALRZDCUZ5J46OZ/" source="SUSE-SU"/>
    <description>
    The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28473/">CVE-2020-28473</cve>
	<bugzilla href="https://bugzilla.suse.com/1182181">SUSE bug 1182181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613185" comment="python-bottle-doc-0.12.13-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009344034" comment="python-bottle-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613186" comment="python2-bottle-0.12.13-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009344035" comment="python2-bottle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613187" comment="python3-bottle-0.12.13-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009344036" comment="python3-bottle is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28600</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28600" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28600" ref_url="https://www.suse.com/security/cve/CVE-2020-28600" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6AL34245BXDPEWDDFP4UJMOIXTZWMV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRU26K45TFOSICBIXTQZONIW6ADCOIVU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-28600/">CVE-2020-28600</cve>
	<bugzilla href="https://bugzilla.suse.com/1185975">SUSE bug 1185975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624530" comment="openscad-2019.05-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624531" comment="openscad is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2875</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WS25DT4QDBVK3PBC74G4JTBWADK62LTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2622-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHHGZ3MEHVZT3NYQIEG5WTISHLXRLW3D/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875</cve>
	<bugzilla href="https://bugzilla.suse.com/1173599">SUSE bug 1173599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630467" comment="mysql-connector-java-5.1.47-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152673" comment="mysql-connector-java is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28896</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28896" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEIF6HZ3PYQV7UDRJUX7FTYYPTVCBVB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYE5B2QAZHGR4OUGARLIROGTKWRSGYPL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612250" comment="mutt-1.10.1-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612251" comment="mutt-doc-1.10.1-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612252" comment="mutt-lang-1.10.1-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606518" comment="neomutt-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606519" comment="neomutt-doc-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606520" comment="neomutt-lang-20201120-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28915</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28916</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916</cve>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28924" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28924" ref_url="https://www.suse.com/security/cve/CVE-2020-28924" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7U7GCOTNOZAWDNUDHOMKJOI2QXP3XJCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5BB2LYUVWQ74YU27Y4CMHJW42OBMUOT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C25WPUFSVQJ345UHYEYH27MOG434LTTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBEJTWZN65MCKRTHPA4DPTTL2ZUEQGTM/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-28924/">CVE-2020-28924</cve>
	<bugzilla href="https://bugzilla.suse.com/1179005">SUSE bug 1179005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612083" comment="rclone-1.53.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300204" comment="rclone is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612084" comment="rclone-bash-completion-1.53.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300205" comment="rclone-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612085" comment="rclone-zsh-completion-1.53.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300206" comment="rclone-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28926" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28926" ref_url="https://www.suse.com/security/cve/CVE-2020-28926" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2GHF3UJM6D2JSKELXMJY57IRWK3PJM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSSIKL5YFHBGYOJ3SQBDZNPPVD4OU4WF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZKSW2K4W6JRPVMJ5SOHHDWS6UI5LAZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S45AUDAZDSITTGVELYZ3FY6T7HMLOED/" source="SUSE-SU"/>
    <description>
    ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28926/">CVE-2020-28926</cve>
	<bugzilla href="https://bugzilla.suse.com/1179447">SUSE bug 1179447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612356" comment="minidlna-1.3.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009334739" comment="minidlna is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0176-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTS3PI42CZC7TVKVUTBOIMO2PDFTABYC/" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<bugzilla href="https://bugzilla.suse.com/1173619">SUSE bug 1173619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615256" comment="nsd-4.3.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338518" comment="nsd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28941</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28941" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28972" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBLIOF4HVH74MTJYI7P5QNH2RNAYWU5E/" source="SUSE-SU"/>
    <description>
    slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2933" ref_url="https://www.suse.com/security/cve/CVE-2020-2933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WS25DT4QDBVK3PBC74G4JTBWADK62LTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2622-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHHGZ3MEHVZT3NYQIEG5WTISHLXRLW3D/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2933/">CVE-2020-2933</cve>
	<bugzilla href="https://bugzilla.suse.com/1173599">SUSE bug 1173599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630467" comment="mysql-connector-java-5.1.47-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152673" comment="mysql-connector-java is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2934" ref_url="https://www.suse.com/security/cve/CVE-2020-2934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WS25DT4QDBVK3PBC74G4JTBWADK62LTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2622-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHHGZ3MEHVZT3NYQIEG5WTISHLXRLW3D/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-2934/">CVE-2020-2934</cve>
	<bugzilla href="https://bugzilla.suse.com/1173599">SUSE bug 1173599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630467" comment="mysql-connector-java-5.1.47-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152673" comment="mysql-connector-java is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010181.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1611-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZHKPKPZEQIHCU2R54QWFT3X2C4JOWBT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWY3OJFF4O6KAVNTWISEXMD7X5Y2XL6I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661696" comment="libp11-kit0-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661793" comment="libp11-kit0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661697" comment="libp11-kit0-32bit-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661794" comment="libp11-kit0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661698" comment="p11-kit-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661795" comment="p11-kit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661699" comment="p11-kit-32bit-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661796" comment="p11-kit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661700" comment="p11-kit-devel-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661797" comment="p11-kit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661701" comment="p11-kit-nss-trust-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661798" comment="p11-kit-nss-trust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661702" comment="p11-kit-nss-trust-32bit-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661799" comment="p11-kit-nss-trust-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661703" comment="p11-kit-tools-0.23.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661800" comment="p11-kit-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29367" ref_url="https://www.suse.com/security/cve/CVE-2020-29367" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPTII3AXCRZZGBCOLCFY7HQI24L2PGVQ/" source="SUSE-SU"/>
    <description>
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-29367/">CVE-2020-29367</cve>
	<bugzilla href="https://bugzilla.suse.com/1179914">SUSE bug 1179914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615771" comment="blosc-devel-1.20.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340461" comment="blosc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615772" comment="libblosc1-1.20.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340463" comment="libblosc1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29369</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179646">SUSE bug 1179646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182109">SUSE bug 1182109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29370</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179648">SUSE bug 1179648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29371</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29373</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29385</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z47MEXBMS3R7XMG63LBJMBIYUX3ZTEJI/" source="SUSE-SU"/>
    <description>
    GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c-&gt;self_code equals 10, self-&gt;code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self-&gt;code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385</cve>
	<bugzilla href="https://bugzilla.suse.com/1180393">SUSE bug 1180393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612950" comment="gdk-pixbuf-devel-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612951" comment="gdk-pixbuf-devel-32bit-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153061" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612952" comment="gdk-pixbuf-lang-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612953" comment="gdk-pixbuf-query-loaders-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612954" comment="gdk-pixbuf-query-loaders-32bit-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612955" comment="gdk-pixbuf-thumbnailer-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177170" comment="gdk-pixbuf-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612956" comment="libgdk_pixbuf-2_0-0-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612957" comment="libgdk_pixbuf-2_0-0-32bit-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612958" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612959" comment="typelib-1_0-GdkPixdata-2_0-2.40.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342391" comment="typelib-1_0-GdkPixdata-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29443</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29480</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/&lt;domid&gt; are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29483</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29484</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562</cve>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613426" comment="glibc-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613427" comment="glibc-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613428" comment="glibc-devel-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613429" comment="glibc-devel-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613430" comment="glibc-devel-static-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613431" comment="glibc-devel-static-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613432" comment="glibc-extra-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613433" comment="glibc-html-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613434" comment="glibc-i18ndata-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613435" comment="glibc-info-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613436" comment="glibc-locale-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613437" comment="glibc-locale-base-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613438" comment="glibc-locale-base-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613439" comment="glibc-profile-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613440" comment="glibc-profile-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613441" comment="glibc-utils-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613442" comment="glibc-utils-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613443" comment="nscd-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-&gt;xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612573" comment="xen-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612574" comment="xen-devel-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612575" comment="xen-doc-html-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612576" comment="xen-libs-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612577" comment="xen-libs-32bit-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612578" comment="xen-tools-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612579" comment="xen-tools-domU-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612580" comment="xen-tools-xendomains-wait-disk-4.13.2_06-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573</cve>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613426" comment="glibc-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613427" comment="glibc-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613428" comment="glibc-devel-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613429" comment="glibc-devel-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613430" comment="glibc-devel-static-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613431" comment="glibc-devel-static-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613432" comment="glibc-extra-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613433" comment="glibc-html-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613434" comment="glibc-i18ndata-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613435" comment="glibc-info-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613436" comment="glibc-locale-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613437" comment="glibc-locale-base-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613438" comment="glibc-locale-base-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613439" comment="glibc-profile-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613440" comment="glibc-profile-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613441" comment="glibc-utils-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613442" comment="glibc-utils-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613443" comment="nscd-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599</cve>
	<bugzilla href="https://bugzilla.suse.com/1179753">SUSE bug 1179753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612928" comment="ImageMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612929" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612930" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612931" comment="ImageMagick-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612932" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612933" comment="ImageMagick-doc-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612934" comment="ImageMagick-extra-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612935" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612936" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612937" comment="libMagick++-devel-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612938" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612939" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612940" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612941" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612942" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612943" comment="perl-PerlMagick-7.0.7.34-lp152.12.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0851-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5N5MI5XRBM5X46XPGTD3CVA6C5MMBQJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5MZ7NDWQ2PACIOK5L2D7CNODUCJCARI/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615019" comment="python2-py-1.8.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477848" comment="python2-py is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615020" comment="python3-py-1.8.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009477849" comment="python3-py is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29661</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29663" ref_url="https://www.suse.com/security/cve/CVE-2020-29663" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7IVRID4FOA6YK4ZLJ273QAN3OEQFE4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MGD4GT6SSRCFTDAW4FIYGJF6HKJQ6AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XNOBY7TETKOOX2HQN4LHXGRCFGFAAFJC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RXCOMXKKWZ7PYODPH5SO5SSBKRXIJWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AG46DROWC4ZEVBNIZC5IYVVFYH4FMFCS/" source="SUSE-SU"/>
    <description>
    Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29663/">CVE-2020-29663</cve>
	<bugzilla href="https://bugzilla.suse.com/1180147">SUSE bug 1180147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626690" comment="icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297975" comment="icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626691" comment="icinga2-bin-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297977" comment="icinga2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626692" comment="icinga2-common-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297979" comment="icinga2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626693" comment="icinga2-doc-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297981" comment="icinga2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626694" comment="icinga2-ido-mysql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297983" comment="icinga2-ido-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626695" comment="icinga2-ido-pgsql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297985" comment="icinga2-ido-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626696" comment="nano-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297987" comment="nano-icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626697" comment="vim-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297989" comment="vim-icinga2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3123</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<bugzilla href="https://bugzilla.suse.com/1162921">SUSE bug 1162921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3327</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<bugzilla href="https://bugzilla.suse.com/1171980">SUSE bug 1171980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3341</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612465" comment="clamav-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612466" comment="clamav-devel-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612467" comment="libclamav9-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612468" comment="libfreshclam2-0.103.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35111</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When an extension with the proxy permission registered to receive &lt;all_urls&gt;, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612526" comment="MozillaFirefox-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612527" comment="MozillaFirefox-branding-upstream-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612528" comment="MozillaFirefox-buildsymbols-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612529" comment="MozillaFirefox-devel-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612530" comment="MozillaFirefox-translations-common-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612531" comment="MozillaFirefox-translations-other-78.6.0-lp152.2.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612523" comment="MozillaThunderbird-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612524" comment="MozillaThunderbird-translations-common-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612525" comment="MozillaThunderbird-translations-other-78.6.0-lp152.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35448</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35452</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35458" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35458" ref_url="https://www.suse.com/security/cve/CVE-2020-35458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VO5ZHH4IHE4JSXKLL5QNLXOG2AGDRLET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOXP4NYYMFT7XRFF2RMNSWISI2EL5AIV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNP2UKCT3X4BSG36I6GNTIIY4ETH3NYP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO3NRDHGVEML362SDTPCVE3FO4TKG3ZX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35458/">CVE-2020-35458</cve>
	<bugzilla href="https://bugzilla.suse.com/1179998">SUSE bug 1179998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612949" comment="hawk2-2.4.0+git.1611141202.2fe6369e-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35459" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009458.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RKSUG2OZN3Y2FQVQ55HP5MZIQZXZ5OD6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKSDDKFQ4YKEAUB3EUAWBPTKNEOH254X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P6Y6RW5YXKZSLM7CRGCZD5EXRQATEN6Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDCDHUWYXHAR4IFS55R2KWBURUA5HAL7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZ4AG2NNHICHYHJBLJR3CWGTGZLQBUDP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626679" comment="crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341552" comment="crmsh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626680" comment="crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341553" comment="crmsh-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626681" comment="crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341554" comment="crmsh-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613859" comment="hawk2-2.6.3+git.1614684118.af555ad9-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35493</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -&gt; out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008326.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22ERXODNOFS7IPNUWPYF2BEMIM5BQTMZ/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613162" comment="libopenvswitch-2_13-0-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342878" comment="libopenvswitch-2_13-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613163" comment="libovn-20_03-0-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342879" comment="libovn-20_03-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613164" comment="openvswitch-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162414" comment="openvswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613165" comment="openvswitch-devel-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162415" comment="openvswitch-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613166" comment="openvswitch-doc-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342880" comment="openvswitch-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613167" comment="openvswitch-ipsec-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342881" comment="openvswitch-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613168" comment="openvswitch-pki-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162421" comment="openvswitch-pki is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613169" comment="openvswitch-test-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162422" comment="openvswitch-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613170" comment="openvswitch-vtep-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162423" comment="openvswitch-vtep is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613171" comment="ovn-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342882" comment="ovn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613172" comment="ovn-central-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342883" comment="ovn-central is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613173" comment="ovn-devel-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342884" comment="ovn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613174" comment="ovn-doc-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342885" comment="ovn-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613175" comment="ovn-docker-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342886" comment="ovn-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613176" comment="ovn-host-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342887" comment="ovn-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613177" comment="ovn-vtep-20.03.1-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342888" comment="ovn-vtep is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613178" comment="python3-ovs-2.13.2-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342889" comment="python3-ovs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35504" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35505" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35506" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMJEHJSAVUMBFKW6O66TYUT5LCUVZD6Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPWMH7OQGRFBQ2ZFL5Z3HCT443A45EIB/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in D-Bus Development branch &lt;= 1.13.16, dbus-1.12.x stable branch &lt;= 1.12.18, and dbus-1.10.x and older branches &lt;= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512</cve>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189662">SUSE bug 1189662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625505" comment="dbus-1-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625506" comment="dbus-1-devel-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625507" comment="dbus-1-devel-32bit-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258222" comment="dbus-1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625508" comment="dbus-1-devel-doc-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258223" comment="dbus-1-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625509" comment="dbus-1-x11-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625510" comment="libdbus-1-3-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625511" comment="libdbus-1-3-32bit-1.12.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35518" ref_url="https://www.suse.com/security/cve/CVE-2020-35518" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJZAIJRIBNKFP5CET6TYMJ3FGMU6WYAM/" source="SUSE-SU"/>
    <description>
    When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35518/">CVE-2020-35518</cve>
	<bugzilla href="https://bugzilla.suse.com/1181159">SUSE bug 1181159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613713" comment="389-ds-1.4.3.19~git0.bef0b5bed-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168666" comment="389-ds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613714" comment="389-ds-devel-1.4.3.19~git0.bef0b5bed-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168668" comment="389-ds-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613715" comment="389-ds-snmp-1.4.3.19~git0.bef0b5bed-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253606" comment="389-ds-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613716" comment="lib389-1.4.3.19~git0.bef0b5bed-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347740" comment="lib389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613717" comment="libsvrcore0-1.4.3.19~git0.bef0b5bed-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347741" comment="libsvrcore0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35519</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184953">SUSE bug 1184953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35573" ref_url="https://www.suse.com/security/cve/CVE-2020-35573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7RVMS6EAM6UL6CEWH7XJZ76RD77LPL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RCKOE2BLGX23FISPQ3WVS2WYO4VR5IUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOF2UA3DXYGYPKJVCZWZ5HMXL2PTHSJR/" source="SUSE-SU"/>
    <description>
    srs2.c in PostSRSd before 1.10 allows remote attackers to cause a denial of service (CPU consumption) via a long timestamp tag in an SRS address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35573/">CVE-2020-35573</cve>
	<bugzilla href="https://bugzilla.suse.com/1180251">SUSE bug 1180251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614473" comment="postsrsd-1.11-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353385" comment="postsrsd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35605</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35605" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35605" ref_url="https://www.suse.com/security/cve/CVE-2020-35605" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23NJIZKNYFEV7VIUDT44MXRZWG23MTXX/" source="SUSE-SU"/>
    <description>
    The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-35605/">CVE-2020-35605</cve>
	<bugzilla href="https://bugzilla.suse.com/1180298">SUSE bug 1180298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613078" comment="kitty-0.16.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340871" comment="kitty is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653</cve>
	<bugzilla href="https://bugzilla.suse.com/1180834">SUSE bug 1180834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654</cve>
	<bugzilla href="https://bugzilla.suse.com/1180833">SUSE bug 1180833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183103">SUSE bug 1183103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655</cve>
	<bugzilla href="https://bugzilla.suse.com/1180832">SUSE bug 1180832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35662</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35678" ref_url="https://www.suse.com/security/cve/CVE-2020-35678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HC22UZIJVKS65SOAIGLLU6XWHC73XYOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXPO3Q3UW27SSZ5A6MCOSCPUHQM7HB7N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6HWC7EEESMXCVV3M3M6OYUZFEGILI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YFFLEQLA5JEDUCNZ6SDNWX77OSIWNZNB/" source="SUSE-SU"/>
    <description>
    Autobahn|Python before 20.12.3 allows redirect header injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35678/">CVE-2020-35678</cve>
	<bugzilla href="https://bugzilla.suse.com/1180570">SUSE bug 1180570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612960" comment="python2-autobahn-17.10.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342290" comment="python2-autobahn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612961" comment="python3-autobahn-17.10.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342291" comment="python3-autobahn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35701</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35701" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35701" ref_url="https://www.suse.com/security/cve/CVE-2020-35701" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DECT547ZRI4T4XP2OGBIPHTLXW2K7KTG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A64OCZCS4IECM2D3DOPFLCT3NC7UHBH7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35701/">CVE-2020-35701</cve>
	<bugzilla href="https://bugzilla.suse.com/1180804">SUSE bug 1180804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615773" comment="cacti-1.2.17-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615774" comment="cacti-spine-1.2.17-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35728</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35728" ref_url="https://www.suse.com/security/cve/CVE-2020-35728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008253.html" source="SUSE-SU"/>
    <description>
    FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35728/">CVE-2020-35728</cve>
	<bugzilla href="https://bugzilla.suse.com/1180391">SUSE bug 1180391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613002" comment="jackson-databind-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342652" comment="jackson-databind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613003" comment="jackson-databind-javadoc-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342653" comment="jackson-databind-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35730" ref_url="https://www.suse.com/security/cve/CVE-2020-35730" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0931-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPPHYZD6Y3QJBTGPLX66Y3DJ3KCNEUJQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DFRT3CZ2UBV2PGLI4GUZ7AGDCQXVUQR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ELZ4EA3I6BCVA2NQEVPSEZ2M3Y5ASM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQFQAJIVNNLDRXMOUJWPMCCBT4WU5N5O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0974-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGT4RWCLEWSTAAYEWMVZRY24ZY53D2Z3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XDARRLWABODNP6ABT3DQ34TPYSH3ROH5/" source="SUSE-SU"/>
    <description>
    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35730/">CVE-2020-35730</cve>
	<bugzilla href="https://bugzilla.suse.com/1180399">SUSE bug 1180399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615863" comment="roundcubemail-1.3.16-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35738</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35738" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612962" comment="libwavpack1-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612963" comment="libwavpack1-32bit-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612964" comment="wavpack-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612965" comment="wavpack-devel-5.4.0-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36129" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36129" ref_url="https://www.suse.com/security/cve/CVE-2020-36129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009940.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMK3AKW3Y2J574OXHVFX4QFELTEHM6MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CU5I3APCIYTJ5MCNA4TTKLC2PLKDGKU/" source="SUSE-SU"/>
    <description>
    AOM v2.0.1 was discovered to contain a stack buffer overflow via the component src/aom_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36129/">CVE-2020-36129</cve>
	<bugzilla href="https://bugzilla.suse.com/1193356">SUSE bug 1193356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661848" comment="aom-tools-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661849" comment="libaom-devel-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661850" comment="libaom-devel-doc-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661851" comment="libaom0-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661852" comment="libaom0-32bit-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36130" ref_url="https://www.suse.com/security/cve/CVE-2020-36130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009940.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMK3AKW3Y2J574OXHVFX4QFELTEHM6MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CU5I3APCIYTJ5MCNA4TTKLC2PLKDGKU/" source="SUSE-SU"/>
    <description>
    AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36130/">CVE-2020-36130</cve>
	<bugzilla href="https://bugzilla.suse.com/1193369">SUSE bug 1193369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661848" comment="aom-tools-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661849" comment="libaom-devel-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661850" comment="libaom-devel-doc-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661851" comment="libaom0-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661852" comment="libaom0-32bit-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36131</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36131" ref_url="https://www.suse.com/security/cve/CVE-2020-36131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009940.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMK3AKW3Y2J574OXHVFX4QFELTEHM6MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CU5I3APCIYTJ5MCNA4TTKLC2PLKDGKU/" source="SUSE-SU"/>
    <description>
    AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36131/">CVE-2020-36131</cve>
	<bugzilla href="https://bugzilla.suse.com/1193365">SUSE bug 1193365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661848" comment="aom-tools-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661849" comment="libaom-devel-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661850" comment="libaom-devel-doc-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661851" comment="libaom0-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661852" comment="libaom0-32bit-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36135" ref_url="https://www.suse.com/security/cve/CVE-2020-36135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009940.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMK3AKW3Y2J574OXHVFX4QFELTEHM6MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CU5I3APCIYTJ5MCNA4TTKLC2PLKDGKU/" source="SUSE-SU"/>
    <description>
    AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36135/">CVE-2020-36135</cve>
	<bugzilla href="https://bugzilla.suse.com/1193366">SUSE bug 1193366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661848" comment="aom-tools-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661849" comment="libaom-devel-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661850" comment="libaom-devel-doc-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661851" comment="libaom0-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661852" comment="libaom0-32bit-1.0.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36148</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36148" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36148" ref_url="https://www.suse.com/security/cve/CVE-2020-36148" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36148/">CVE-2020-36148</cve>
	<bugzilla href="https://bugzilla.suse.com/1181981">SUSE bug 1181981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36149</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36149" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36149" ref_url="https://www.suse.com/security/cve/CVE-2020-36149" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Incorrect handling of input data in changeAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36149/">CVE-2020-36149</cve>
	<bugzilla href="https://bugzilla.suse.com/1181980">SUSE bug 1181980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36150</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36150" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36150" ref_url="https://www.suse.com/security/cve/CVE-2020-36150" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36150/">CVE-2020-36150</cve>
	<bugzilla href="https://bugzilla.suse.com/1181979">SUSE bug 1181979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36151</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36151" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36151" ref_url="https://www.suse.com/security/cve/CVE-2020-36151" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36151/">CVE-2020-36151</cve>
	<bugzilla href="https://bugzilla.suse.com/1181978">SUSE bug 1181978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36152</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36152" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36152" ref_url="https://www.suse.com/security/cve/CVE-2020-36152" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmysofa 0.5 - 1.1 allows attackers to execute arbitrary code via a crafted SOFA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36152/">CVE-2020-36152</cve>
	<bugzilla href="https://bugzilla.suse.com/1181977">SUSE bug 1181977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36158</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614229" comment="kernel-debug-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614230" comment="kernel-debug-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614231" comment="kernel-default-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614232" comment="kernel-default-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614233" comment="kernel-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614234" comment="kernel-docs-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614235" comment="kernel-docs-html-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614236" comment="kernel-kvmsmall-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614237" comment="kernel-kvmsmall-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614238" comment="kernel-macros-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614239" comment="kernel-obs-build-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614240" comment="kernel-obs-qa-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614241" comment="kernel-preempt-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614242" comment="kernel-preempt-devel-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614243" comment="kernel-source-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614244" comment="kernel-source-vanilla-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614245" comment="kernel-syms-5.3.18-lp152.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009434.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1267-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FVUJPS33WNJWFOH7YMK5YSCLKXVMWLW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCXMJ4INSB7EFEHMD7OOE6NXYQU2F77I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXQPYU7Y2O7P5YZ73KTEOHBFQS2G55P3/" source="SUSE-SU"/>
    <description>
    Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193</cve>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632901" comment="php7-pear-1.10.21-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632902" comment="php7-pecl-1.10.21-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632740" comment="php7-pecl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36223</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36224</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36226</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-&gt;bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36227</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36230</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36241</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36241" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYPCMBEG7F5HYZ6RXTSOZ7RTGRUXLCS2/" source="SUSE-SU"/>
    <description>
    autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241</cve>
	<bugzilla href="https://bugzilla.suse.com/1181930">SUSE bug 1181930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184169">SUSE bug 1184169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613609" comment="gnome-autoar-devel-0.2.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346923" comment="gnome-autoar-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613610" comment="libgnome-autoar-0-0-0.2.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346924" comment="libgnome-autoar-0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613611" comment="libgnome-autoar-gtk-0-0-0.2.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346925" comment="libgnome-autoar-gtk-0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613612" comment="typelib-1_0-GnomeAutoar-0_1-0.2.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346926" comment="typelib-1_0-GnomeAutoar-0_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613613" comment="typelib-1_0-GnomeAutoarGtk-0_1-0.2.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346927" comment="typelib-1_0-GnomeAutoarGtk-0_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36242</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQZIOJTSAUNBJZ24KXLCQWD35GCPXJF/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613416" comment="python2-cryptography-2.8-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238250" comment="python2-cryptography is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613417" comment="python3-cryptography-2.8-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36312</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36322</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36385</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36403</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36403" ref_url="https://www.suse.com/security/cve/CVE-2020-36403" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBQ3P4CDK2RZWTSHMKMA7FGIAJRHWW4Q/" source="SUSE-SU"/>
    <description>
    HTSlib 1.10 through 1.10.2 allows out-of-bounds write access in vcf_parse_format (called from vcf_parse and vcf_read).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36403/">CVE-2020-36403</cve>
	<bugzilla href="https://bugzilla.suse.com/1187917">SUSE bug 1187917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631552" comment="bgzip-1.10.2-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631553" comment="bgzip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631554" comment="htsfile-1.10.2-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631555" comment="htsfile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631556" comment="libhts-devel-1.10.2-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631557" comment="libhts-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631558" comment="libhts3-1.10.2-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631559" comment="libhts3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631560" comment="tabix-1.10.2-lp152.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631561" comment="tabix is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36430</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36430" ref_url="https://www.suse.com/security/cve/CVE-2020-36430" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM3NSAZAHOVXI7OL5NKRPHCXG5LZTLKM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2792-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQ4DQBQAAUJIVKVW7IIROTEKRYDSFT2S/" source="SUSE-SU"/>
    <description>
    libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36430/">CVE-2020-36430</cve>
	<bugzilla href="https://bugzilla.suse.com/1188539">SUSE bug 1188539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631506" comment="libass-devel-0.14.0-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153843" comment="libass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631507" comment="libass9-0.14.0-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177230" comment="libass9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631508" comment="libass9-32bit-0.14.0-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009348105" comment="libass9-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3702</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4044</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007230.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" source="SUSE-SU"/>
    <description>
    The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610352" comment="libpainter0-0.9.13.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287510" comment="libpainter0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610353" comment="librfxencode0-0.9.13.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287511" comment="librfxencode0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610354" comment="xrdp-0.9.13.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287512" comment="xrdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610355" comment="xrdp-devel-0.9.13.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287513" comment="xrdp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4067</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4067" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4067" ref_url="https://www.suse.com/security/cve/CVE-2020-4067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html" source="SUSE-SU"/>
    <description>
    In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-4067/">CVE-2020-4067</cve>
	<bugzilla href="https://bugzilla.suse.com/1173510">SUSE bug 1173510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612737" comment="coturn-4.5.1.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291480" comment="coturn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612738" comment="coturn-devel-4.5.1.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291481" comment="coturn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612739" comment="coturn-utils-4.5.1.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291482" comment="coturn-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612357" comment="kernel-debug-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612358" comment="kernel-debug-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612359" comment="kernel-default-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612463" comment="kernel-default-base-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612464" comment="kernel-default-base-rebuild-5.3.18-lp152.57.1.lp152.8.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612362" comment="kernel-default-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612363" comment="kernel-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612364" comment="kernel-docs-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612365" comment="kernel-docs-html-5.3.18-lp152.54.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612366" comment="kernel-kvmsmall-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612367" comment="kernel-kvmsmall-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612368" comment="kernel-macros-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612369" comment="kernel-obs-build-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612370" comment="kernel-obs-qa-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612371" comment="kernel-preempt-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612372" comment="kernel-preempt-devel-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612373" comment="kernel-source-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612374" comment="kernel-source-vanilla-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612375" comment="kernel-syms-5.3.18-lp152.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165524">SUSE bug 1165524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5249</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5249" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5249" ref_url="https://www.suse.com/security/cve/CVE-2020-5249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.3 and 3.12.4, if an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2020-5247, which fixed this vulnerability but only for regular responses. This has been fixed in 4.3.3 and 3.12.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5249/">CVE-2020-5249</cve>
	<bugzilla href="https://bugzilla.suse.com/1165524">SUSE bug 1165524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5267</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5283" ref_url="https://www.suse.com/security/cve/CVE-2020-5283" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFA7OR2MLXELR6A6M634B47K2RIB7LYV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGEO74AOMRFBUZ5VL2QLLN3TAWYC7ZKW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MAJYDJLUUCZVZ2IZJFFWFQ663RENRLLG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2A7TO5T4QEJHRLA7YZBTOPVCY4745TO/" source="SUSE-SU"/>
    <description>
    ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5283/">CVE-2020-5283</cve>
	<bugzilla href="https://bugzilla.suse.com/1167974">SUSE bug 1167974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612925" comment="viewvc-1.1.28-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151738" comment="viewvc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6097</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6097" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6097" ref_url="https://www.suse.com/security/cve/CVE-2020-6097" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00058.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6097/">CVE-2020-6097</cve>
	<bugzilla href="https://bugzilla.suse.com/1176437">SUSE bug 1176437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611673" comment="atftp-0.7.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296746" comment="atftp is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6463</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/1171975">SUSE bug 1171975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610357" comment="MozillaThunderbird-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610358" comment="MozillaThunderbird-translations-common-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610359" comment="MozillaThunderbird-translations-other-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6464</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6464" ref_url="https://www.suse.com/security/cve/CVE-2020-6464" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html" source="SUSE-SU"/>
    <description>
    Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6464/">CVE-2020-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612717" comment="opera-68.0.3618.104-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6505" ref_url="https://www.suse.com/security/cve/CVE-2020-6505" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6505/">CVE-2020-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612687" comment="chromedriver-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612688" comment="chromium-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6506" ref_url="https://www.suse.com/security/cve/CVE-2020-6506" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebView in Google Chrome on Android prior to 83.0.4103.106 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6506/">CVE-2020-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612687" comment="chromedriver-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612688" comment="chromium-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6507" ref_url="https://www.suse.com/security/cve/CVE-2020-6507" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6507/">CVE-2020-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612687" comment="chromedriver-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612688" comment="chromium-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6509" ref_url="https://www.suse.com/security/cve/CVE-2020-6509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0949-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6509/">CVE-2020-6509</cve>
	<bugzilla href="https://bugzilla.suse.com/1173251">SUSE bug 1173251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612774" comment="opera-69.0.3686.49-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612687" comment="chromedriver-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612688" comment="chromium-83.0.4103.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6510</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6510" ref_url="https://www.suse.com/security/cve/CVE-2020-6510" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6510/">CVE-2020-6510</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6511" ref_url="https://www.suse.com/security/cve/CVE-2020-6511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6511/">CVE-2020-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6512" ref_url="https://www.suse.com/security/cve/CVE-2020-6512" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6512/">CVE-2020-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6513</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6513" ref_url="https://www.suse.com/security/cve/CVE-2020-6513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6513/">CVE-2020-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6514</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610310" comment="MozillaFirefox-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610311" comment="MozillaFirefox-branding-upstream-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610312" comment="MozillaFirefox-buildsymbols-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610313" comment="MozillaFirefox-devel-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610314" comment="MozillaFirefox-translations-common-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610315" comment="MozillaFirefox-translations-other-78.1.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610357" comment="MozillaThunderbird-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610358" comment="MozillaThunderbird-translations-common-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610359" comment="MozillaThunderbird-translations-other-68.11.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610316" comment="gstreamer-plugin-pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291464" comment="gstreamer-plugin-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610317" comment="libpipewire-0_3-0-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291465" comment="libpipewire-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610318" comment="pipewire-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291466" comment="pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610319" comment="pipewire-devel-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291467" comment="pipewire-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610320" comment="pipewire-doc-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291468" comment="pipewire-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610321" comment="pipewire-libjack-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291469" comment="pipewire-libjack-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610322" comment="pipewire-libpulse-0_3-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291470" comment="pipewire-libpulse-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610323" comment="pipewire-modules-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291471" comment="pipewire-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610324" comment="pipewire-spa-plugins-0_2-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291472" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610325" comment="pipewire-spa-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291473" comment="pipewire-spa-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610326" comment="pipewire-tools-0.3.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291474" comment="pipewire-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6515" ref_url="https://www.suse.com/security/cve/CVE-2020-6515" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6515/">CVE-2020-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6516" ref_url="https://www.suse.com/security/cve/CVE-2020-6516" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6516/">CVE-2020-6516</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6517" ref_url="https://www.suse.com/security/cve/CVE-2020-6517" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6517/">CVE-2020-6517</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6518" ref_url="https://www.suse.com/security/cve/CVE-2020-6518" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6518/">CVE-2020-6518</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6519</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6519" ref_url="https://www.suse.com/security/cve/CVE-2020-6519" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6519/">CVE-2020-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6520</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6520" ref_url="https://www.suse.com/security/cve/CVE-2020-6520" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6520/">CVE-2020-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6521" ref_url="https://www.suse.com/security/cve/CVE-2020-6521" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6521/">CVE-2020-6521</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6522" ref_url="https://www.suse.com/security/cve/CVE-2020-6522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6522/">CVE-2020-6522</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6523" ref_url="https://www.suse.com/security/cve/CVE-2020-6523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6523/">CVE-2020-6523</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6524" ref_url="https://www.suse.com/security/cve/CVE-2020-6524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6524/">CVE-2020-6524</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6525" ref_url="https://www.suse.com/security/cve/CVE-2020-6525" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6525/">CVE-2020-6525</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6526" ref_url="https://www.suse.com/security/cve/CVE-2020-6526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6526/">CVE-2020-6526</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6527" ref_url="https://www.suse.com/security/cve/CVE-2020-6527" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6527/">CVE-2020-6527</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6528" ref_url="https://www.suse.com/security/cve/CVE-2020-6528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6528/">CVE-2020-6528</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6529" ref_url="https://www.suse.com/security/cve/CVE-2020-6529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6529/">CVE-2020-6529</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6530</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6530" ref_url="https://www.suse.com/security/cve/CVE-2020-6530" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6530/">CVE-2020-6530</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6531" ref_url="https://www.suse.com/security/cve/CVE-2020-6531" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6531/">CVE-2020-6531</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6532" ref_url="https://www.suse.com/security/cve/CVE-2020-6532" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in SCTP in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6532/">CVE-2020-6532</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6533" ref_url="https://www.suse.com/security/cve/CVE-2020-6533" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6533/">CVE-2020-6533</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6534" ref_url="https://www.suse.com/security/cve/CVE-2020-6534" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6534/">CVE-2020-6534</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6535" ref_url="https://www.suse.com/security/cve/CVE-2020-6535" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6535/">CVE-2020-6535</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6536" ref_url="https://www.suse.com/security/cve/CVE-2020-6536" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6536/">CVE-2020-6536</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610302" comment="opera-70.0.3728.71-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609999" comment="chromedriver-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610000" comment="chromium-84.0.4147.89-lp152.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6537" ref_url="https://www.suse.com/security/cve/CVE-2020-6537" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6537/">CVE-2020-6537</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6538" ref_url="https://www.suse.com/security/cve/CVE-2020-6538" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebView in Google Chrome on Android prior to 84.0.4147.105 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6538/">CVE-2020-6538</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6539" ref_url="https://www.suse.com/security/cve/CVE-2020-6539" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in CSS in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6539/">CVE-2020-6539</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6540" ref_url="https://www.suse.com/security/cve/CVE-2020-6540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Skia in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6540/">CVE-2020-6540</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6541" ref_url="https://www.suse.com/security/cve/CVE-2020-6541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in WebUSB in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6541/">CVE-2020-6541</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604512" comment="chromedriver-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604513" comment="chromium-84.0.4147.105-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6542" ref_url="https://www.suse.com/security/cve/CVE-2020-6542" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6542/">CVE-2020-6542</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6543" ref_url="https://www.suse.com/security/cve/CVE-2020-6543" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in task scheduling in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6543/">CVE-2020-6543</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6544" ref_url="https://www.suse.com/security/cve/CVE-2020-6544" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6544/">CVE-2020-6544</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6545" ref_url="https://www.suse.com/security/cve/CVE-2020-6545" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6545/">CVE-2020-6545</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6546</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6546" ref_url="https://www.suse.com/security/cve/CVE-2020-6546" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6546/">CVE-2020-6546</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6547</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6547" ref_url="https://www.suse.com/security/cve/CVE-2020-6547" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6547/">CVE-2020-6547</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6548" ref_url="https://www.suse.com/security/cve/CVE-2020-6548" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6548/">CVE-2020-6548</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6549</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6549" ref_url="https://www.suse.com/security/cve/CVE-2020-6549" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6549/">CVE-2020-6549</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6550</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6550" ref_url="https://www.suse.com/security/cve/CVE-2020-6550" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in IndexedDB in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6550/">CVE-2020-6550</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6551" ref_url="https://www.suse.com/security/cve/CVE-2020-6551" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in WebXR in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6551/">CVE-2020-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6552</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6552" ref_url="https://www.suse.com/security/cve/CVE-2020-6552" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6552/">CVE-2020-6552</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6553" ref_url="https://www.suse.com/security/cve/CVE-2020-6553" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in offline mode in Google Chrome on iOS prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6553/">CVE-2020-6553</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6554</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6554" ref_url="https://www.suse.com/security/cve/CVE-2020-6554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6554/">CVE-2020-6554</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6555" ref_url="https://www.suse.com/security/cve/CVE-2020-6555" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in WebGL in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6555/">CVE-2020-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610937" comment="opera-70.0.3728.133-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604617" comment="chromedriver-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604618" comment="chromium-84.0.4147.125-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6556" ref_url="https://www.suse.com/security/cve/CVE-2020-6556" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6556/">CVE-2020-6556</cve>
	<bugzilla href="https://bugzilla.suse.com/1175505">SUSE bug 1175505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610684" comment="chromedriver-84.0.4147.135-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610685" comment="chromium-84.0.4147.135-lp152.2.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6557</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6557" ref_url="https://www.suse.com/security/cve/CVE-2020-6557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6557/">CVE-2020-6557</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605683" comment="chromedriver-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605684" comment="chromium-86.0.4240.75-lp152.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605685" comment="gn-0.1807-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6558" ref_url="https://www.suse.com/security/cve/CVE-2020-6558" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6558/">CVE-2020-6558</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6559" ref_url="https://www.suse.com/security/cve/CVE-2020-6559" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6559/">CVE-2020-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6560" ref_url="https://www.suse.com/security/cve/CVE-2020-6560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6560/">CVE-2020-6560</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6561" ref_url="https://www.suse.com/security/cve/CVE-2020-6561" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6561/">CVE-2020-6561</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6562" ref_url="https://www.suse.com/security/cve/CVE-2020-6562" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6562/">CVE-2020-6562</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6563" ref_url="https://www.suse.com/security/cve/CVE-2020-6563" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6563/">CVE-2020-6563</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6564</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6564" ref_url="https://www.suse.com/security/cve/CVE-2020-6564" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6564/">CVE-2020-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6565" ref_url="https://www.suse.com/security/cve/CVE-2020-6565" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6565/">CVE-2020-6565</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6566" ref_url="https://www.suse.com/security/cve/CVE-2020-6566" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6566/">CVE-2020-6566</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6567" ref_url="https://www.suse.com/security/cve/CVE-2020-6567" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6567/">CVE-2020-6567</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6568" ref_url="https://www.suse.com/security/cve/CVE-2020-6568" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6568/">CVE-2020-6568</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6569" ref_url="https://www.suse.com/security/cve/CVE-2020-6569" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6569/">CVE-2020-6569</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6570" ref_url="https://www.suse.com/security/cve/CVE-2020-6570" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6570/">CVE-2020-6570</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6571" ref_url="https://www.suse.com/security/cve/CVE-2020-6571" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6571/">CVE-2020-6571</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6573" ref_url="https://www.suse.com/security/cve/CVE-2020-6573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6573/">CVE-2020-6573</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6574" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6574" ref_url="https://www.suse.com/security/cve/CVE-2020-6574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6574/">CVE-2020-6574</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6575" ref_url="https://www.suse.com/security/cve/CVE-2020-6575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6575/">CVE-2020-6575</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6576</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6576" ref_url="https://www.suse.com/security/cve/CVE-2020-6576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6576/">CVE-2020-6576</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605686" comment="opera-71.0.3770.228-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605286" comment="chromedriver-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605287" comment="chromium-85.0.4183.102-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6624" ref_url="https://www.suse.com/security/cve/CVE-2020-6624" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-6624/">CVE-2020-6624</cve>
	<bugzilla href="https://bugzilla.suse.com/1160547">SUSE bug 1160547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6625" ref_url="https://www.suse.com/security/cve/CVE-2020-6625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6625/">CVE-2020-6625</cve>
	<bugzilla href="https://bugzilla.suse.com/1160544">SUSE bug 1160544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6816" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6816" ref_url="https://www.suse.com/security/cve/CVE-2020-6816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YFAKMJGUZHUTZ53ZAID6PRVP5MSLXPGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAZHEWM4ZYBZY5GDDDOMIZYEGFNANLKS/" source="SUSE-SU"/>
    <description>
    In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg or math tags are whitelisted and the keyword argument strip=False.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6816/">CVE-2020-6816</cve>
	<bugzilla href="https://bugzilla.suse.com/1167379">SUSE bug 1167379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614157" comment="python2-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279500" comment="python2-bleach is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614158" comment="python3-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279501" comment="python3-bleach is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6817" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6817" ref_url="https://www.suse.com/security/cve/CVE-2020-6817" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YFAKMJGUZHUTZ53ZAID6PRVP5MSLXPGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAZHEWM4ZYBZY5GDDDOMIZYEGFNANLKS/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6817/">CVE-2020-6817</cve>
	<bugzilla href="https://bugzilla.suse.com/1168280">SUSE bug 1168280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614157" comment="python2-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279500" comment="python2-bleach is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614158" comment="python3-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279501" comment="python3-bleach is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6829</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633723" comment="libfreebl3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633724" comment="libfreebl3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633725" comment="libfreebl3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633726" comment="libfreebl3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633727" comment="libsoftokn3-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633728" comment="libsoftokn3-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633729" comment="libsoftokn3-hmac-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633730" comment="libsoftokn3-hmac-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633731" comment="mozilla-nspr-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633732" comment="mozilla-nspr-32bit-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633733" comment="mozilla-nspr-devel-4.32-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633734" comment="mozilla-nss-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633735" comment="mozilla-nss-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633736" comment="mozilla-nss-certs-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633737" comment="mozilla-nss-certs-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633738" comment="mozilla-nss-devel-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633739" comment="mozilla-nss-sysinit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633740" comment="mozilla-nss-sysinit-32bit-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633741" comment="mozilla-nss-tools-3.68-lp152.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6831</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html" source="SUSE-SU"/>
    <description>
    A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612717" comment="opera-68.0.3618.104-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6860" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6860" ref_url="https://www.suse.com/security/cve/CVE-2020-6860" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UFAOL5LVMXJXRBU3JU2LMHQNMBUBR7BH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN6725XH7QNBYEUP2ZXR5TYK6FD6RGXR/" source="SUSE-SU"/>
    <description>
    libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hdf/dataobject.c during the reading of a header message attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6860/">CVE-2020-6860</cve>
	<bugzilla href="https://bugzilla.suse.com/1182883">SUSE bug 1182883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613797" comment="libmysofa-devel-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347885" comment="libmysofa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613798" comment="libmysofa0-0.9.1-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347886" comment="libmysofa0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00016.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<bugzilla href="https://bugzilla.suse.com/1175203">SUSE bug 1175203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610947" comment="apache2-mod_php7-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610948" comment="php7-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610949" comment="php7-bcmath-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610950" comment="php7-bz2-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610951" comment="php7-calendar-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610952" comment="php7-ctype-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610953" comment="php7-curl-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610954" comment="php7-dba-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610955" comment="php7-devel-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610956" comment="php7-dom-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610957" comment="php7-embed-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610958" comment="php7-enchant-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610959" comment="php7-exif-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610960" comment="php7-fastcgi-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610961" comment="php7-fileinfo-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610962" comment="php7-firebird-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610963" comment="php7-fpm-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610964" comment="php7-ftp-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610965" comment="php7-gd-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610966" comment="php7-gettext-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610967" comment="php7-gmp-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610968" comment="php7-iconv-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610969" comment="php7-intl-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610970" comment="php7-json-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610971" comment="php7-ldap-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610972" comment="php7-mbstring-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610973" comment="php7-mysql-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610974" comment="php7-odbc-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610975" comment="php7-opcache-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610976" comment="php7-openssl-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610977" comment="php7-pcntl-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610978" comment="php7-pdo-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610979" comment="php7-pgsql-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610980" comment="php7-phar-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610981" comment="php7-posix-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610982" comment="php7-readline-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610983" comment="php7-shmop-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610984" comment="php7-snmp-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610985" comment="php7-soap-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610986" comment="php7-sockets-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610987" comment="php7-sodium-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610988" comment="php7-sqlite-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610989" comment="php7-sysvmsg-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610990" comment="php7-sysvsem-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610991" comment="php7-sysvshm-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610992" comment="php7-test-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610993" comment="php7-tidy-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610994" comment="php7-tokenizer-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610995" comment="php7-xmlreader-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610996" comment="php7-xmlrpc-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610997" comment="php7-xmlwriter-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610998" comment="php7-xsl-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610999" comment="php7-zip-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611000" comment="php7-zlib-7.4.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7069</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007610.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<bugzilla href="https://bugzilla.suse.com/1177351">SUSE bug 1177351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611612" comment="apache2-mod_php7-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611613" comment="php7-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611614" comment="php7-bcmath-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611615" comment="php7-bz2-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611616" comment="php7-calendar-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611617" comment="php7-ctype-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611618" comment="php7-curl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611619" comment="php7-dba-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611620" comment="php7-devel-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611621" comment="php7-dom-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611622" comment="php7-embed-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611623" comment="php7-enchant-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611624" comment="php7-exif-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611625" comment="php7-fastcgi-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611626" comment="php7-fileinfo-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611627" comment="php7-firebird-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611628" comment="php7-fpm-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611629" comment="php7-ftp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611630" comment="php7-gd-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611631" comment="php7-gettext-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611632" comment="php7-gmp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611633" comment="php7-iconv-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611634" comment="php7-intl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611635" comment="php7-json-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611636" comment="php7-ldap-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611637" comment="php7-mbstring-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611638" comment="php7-mysql-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611639" comment="php7-odbc-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611640" comment="php7-opcache-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611641" comment="php7-openssl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611642" comment="php7-pcntl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611643" comment="php7-pdo-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611644" comment="php7-pgsql-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611645" comment="php7-phar-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611646" comment="php7-posix-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611647" comment="php7-readline-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611648" comment="php7-shmop-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611649" comment="php7-snmp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611650" comment="php7-soap-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611651" comment="php7-sockets-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611652" comment="php7-sodium-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611653" comment="php7-sqlite-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611654" comment="php7-sysvmsg-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611655" comment="php7-sysvsem-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611656" comment="php7-sysvshm-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611657" comment="php7-test-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611658" comment="php7-tidy-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611659" comment="php7-tokenizer-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611660" comment="php7-xmlreader-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611661" comment="php7-xmlrpc-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611662" comment="php7-xmlwriter-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611663" comment="php7-xsl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611664" comment="php7-zip-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611665" comment="php7-zlib-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7070</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007610.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611612" comment="apache2-mod_php7-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611613" comment="php7-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611614" comment="php7-bcmath-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611615" comment="php7-bz2-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611616" comment="php7-calendar-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611617" comment="php7-ctype-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611618" comment="php7-curl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611619" comment="php7-dba-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611620" comment="php7-devel-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611621" comment="php7-dom-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611622" comment="php7-embed-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611623" comment="php7-enchant-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611624" comment="php7-exif-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611625" comment="php7-fastcgi-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611626" comment="php7-fileinfo-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611627" comment="php7-firebird-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611628" comment="php7-fpm-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611629" comment="php7-ftp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611630" comment="php7-gd-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611631" comment="php7-gettext-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611632" comment="php7-gmp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611633" comment="php7-iconv-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611634" comment="php7-intl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611635" comment="php7-json-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611636" comment="php7-ldap-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611637" comment="php7-mbstring-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611638" comment="php7-mysql-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611639" comment="php7-odbc-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611640" comment="php7-opcache-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611641" comment="php7-openssl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611642" comment="php7-pcntl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611643" comment="php7-pdo-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611644" comment="php7-pgsql-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611645" comment="php7-phar-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611646" comment="php7-posix-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611647" comment="php7-readline-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611648" comment="php7-shmop-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611649" comment="php7-snmp-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611650" comment="php7-soap-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611651" comment="php7-sockets-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611652" comment="php7-sodium-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611653" comment="php7-sqlite-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611654" comment="php7-sysvmsg-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611655" comment="php7-sysvsem-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611656" comment="php7-sysvshm-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611657" comment="php7-test-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611658" comment="php7-tidy-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611659" comment="php7-tokenizer-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611660" comment="php7-xmlreader-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611661" comment="php7-xmlrpc-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611662" comment="php7-xmlwriter-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611663" comment="php7-xsl-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611664" comment="php7-zip-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611665" comment="php7-zlib-7.4.6-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7071</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008205.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZK6WI45JWQQCL3UANARH52Z3ZFW35EEN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVZV746EP7YN4PYD2GLL5MXDCB5X5DPB/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612828" comment="apache2-mod_php7-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612829" comment="php7-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612830" comment="php7-bcmath-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612831" comment="php7-bz2-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612832" comment="php7-calendar-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612833" comment="php7-ctype-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612834" comment="php7-curl-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612835" comment="php7-dba-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612836" comment="php7-devel-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612837" comment="php7-dom-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612838" comment="php7-embed-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612839" comment="php7-enchant-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612840" comment="php7-exif-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612841" comment="php7-fastcgi-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612842" comment="php7-fileinfo-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612843" comment="php7-firebird-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612844" comment="php7-fpm-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612845" comment="php7-ftp-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612846" comment="php7-gd-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612847" comment="php7-gettext-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612848" comment="php7-gmp-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612849" comment="php7-iconv-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612850" comment="php7-intl-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612851" comment="php7-json-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612852" comment="php7-ldap-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612853" comment="php7-mbstring-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612854" comment="php7-mysql-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612855" comment="php7-odbc-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612856" comment="php7-opcache-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612857" comment="php7-openssl-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612858" comment="php7-pcntl-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612859" comment="php7-pdo-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612860" comment="php7-pgsql-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612861" comment="php7-phar-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612862" comment="php7-posix-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612863" comment="php7-readline-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612864" comment="php7-shmop-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612865" comment="php7-snmp-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612866" comment="php7-soap-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612867" comment="php7-sockets-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612868" comment="php7-sodium-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612869" comment="php7-sqlite-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612870" comment="php7-sysvmsg-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612871" comment="php7-sysvsem-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612872" comment="php7-sysvshm-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612873" comment="php7-test-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612874" comment="php7-tidy-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612875" comment="php7-tokenizer-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612876" comment="php7-xmlreader-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612877" comment="php7-xmlrpc-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612878" comment="php7-xmlwriter-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612879" comment="php7-xsl-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612880" comment="php7-zip-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612881" comment="php7-zlib-7.4.6-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7774</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625524" comment="nodejs14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625525" comment="nodejs14-devel-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625526" comment="nodejs14-docs-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629528" comment="nodejs8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629529" comment="nodejs8-devel-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629530" comment="nodejs8-docs-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625527" comment="npm14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629531" comment="npm8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00029.html" source="SUSE-SU"/>
    <description>
    A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SECURITY, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to escalate privileges from user ldap to root. This issue affects: SUSE Enterprise Storage 5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Debuginfo 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Debuginfo 11-SP4 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Point of Sale 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 11-SECURITY openldap2-client-openssl1 versions prior to 2.4.26-0.74.13.1. SUSE Linux Enterprise Server 11-SP4-LTSS openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 12-SP2-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP2-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP4 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.31.1. SUSE Linux Enterprise Server for SAP 12-SP2 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 12-SP3 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.31.1. SUSE OpenStack Cloud 7 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud 8 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud Crowbar 8 openldap2 versions prior to 2.4.41-18.71.2. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.12.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190347">SUSE bug 1190347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612792" comment="libldap-2_4-2-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612793" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612794" comment="libldap-data-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612795" comment="openldap2-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612796" comment="openldap2-back-meta-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612797" comment="openldap2-back-perl-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612798" comment="openldap2-back-sock-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612799" comment="openldap2-back-sql-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612800" comment="openldap2-client-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612801" comment="openldap2-contrib-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612802" comment="openldap2-devel-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612803" comment="openldap2-devel-32bit-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612804" comment="openldap2-devel-static-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612805" comment="openldap2-doc-2.4.46-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612806" comment="openldap2-ppolicy-check-password-1.2-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8024" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8024" ref_url="https://www.suse.com/security/cve/CVE-2020-8024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00022.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of hylafax+ of openSUSE Leap 15.2, openSUSE Leap 15.1, openSUSE Factory allows local attackers to escalate from user uucp to users calling hylafax binaries. This issue affects: openSUSE Leap 15.2 hylafax+ versions prior to 7.0.2-lp152.2.1. openSUSE Leap 15.1 hylafax+ version 5.6.1-lp151.3.7 and prior versions. openSUSE Factory hylafax+ versions prior to 7.0.2-2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8024/">CVE-2020-8024</cve>
	<bugzilla href="https://bugzilla.suse.com/1172731">SUSE bug 1172731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615775" comment="hylafax+-7.0.3-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615776" comment="hylafax+-client-7.0.3-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615777" comment="libfaxutil7_0_3-7.0.3-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8026" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8026" ref_url="https://www.suse.com/security/cve/CVE-2020-8026" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8026/">CVE-2020-8026</cve>
	<bugzilla href="https://bugzilla.suse.com/1172573">SUSE bug 1172573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610700" comment="inn-2.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278741" comment="inn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610701" comment="inn-devel-2.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278742" comment="inn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610702" comment="mininews-2.6.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278743" comment="mininews is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8027</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8027" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00094.html" source="SUSE-SU"/>
    <description>
    A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611285" comment="libldap-2_4-2-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611286" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611287" comment="libldap-data-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611288" comment="openldap2-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611289" comment="openldap2-back-meta-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611290" comment="openldap2-back-perl-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611291" comment="openldap2-back-sock-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611292" comment="openldap2-back-sql-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611293" comment="openldap2-client-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611294" comment="openldap2-contrib-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611295" comment="openldap2-devel-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611296" comment="openldap2-devel-32bit-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611297" comment="openldap2-devel-static-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611298" comment="openldap2-doc-2.4.46-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611299" comment="openldap2-ppolicy-check-password-1.2-lp152.14.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8037" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS4ETM3JSH2SWUOYCYLRBRPQPCJ7QXGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1986-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLS7QAB5MKRGXWLJ5MLIV2TPU4TWVXE5/" source="SUSE-SU"/>
    <description>
    The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612056" comment="tcpdump-4.9.2-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8154" ref_url="https://www.suse.com/security/cve/CVE-2020-8154" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8154/">CVE-2020-8154</cve>
	<bugzilla href="https://bugzilla.suse.com/1171579">SUSE bug 1171579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615778" comment="nextcloud-20.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8155" ref_url="https://www.suse.com/security/cve/CVE-2020-8155" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-8155/">CVE-2020-8155</cve>
	<bugzilla href="https://bugzilla.suse.com/1171572">SUSE bug 1171572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615778" comment="nextcloud-20.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611283" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253149" comment="ruby2.5-rubygem-actionpack-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611284" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253150" comment="ruby2.5-rubygem-actionpack-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8165</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnernerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611496" comment="ruby2.5-rubygem-activesupport-5_1-5.1.4-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295961" comment="ruby2.5-rubygem-activesupport-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611497" comment="ruby2.5-rubygem-activesupport-doc-5_1-5.1.4-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295962" comment="ruby2.5-rubygem-activesupport-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF forgery vulnerability exists in rails &lt; 5.2.5, rails &lt; 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166</cve>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8167" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF vulnerability exists in rails &lt;= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167</cve>
	<bugzilla href="https://bugzilla.suse.com/1172184">SUSE bug 1172184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8169</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00058.html" source="SUSE-SU"/>
    <description>
    curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169</cve>
	<bugzilla href="https://bugzilla.suse.com/1173026">SUSE bug 1173026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612676" comment="curl-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612677" comment="curl-mini-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612678" comment="libcurl-devel-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612679" comment="libcurl-devel-32bit-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612680" comment="libcurl-mini-devel-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612681" comment="libcurl4-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612682" comment="libcurl4-32bit-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612683" comment="libcurl4-mini-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00072.html" source="SUSE-SU"/>
    <description>
    curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612676" comment="curl-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612677" comment="curl-mini-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612678" comment="libcurl-devel-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612679" comment="libcurl-devel-32bit-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612680" comment="libcurl-mini-devel-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612681" comment="libcurl4-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612682" comment="libcurl4-32bit-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612683" comment="libcurl4-mini-7.66.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8183</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8183" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8183" ref_url="https://www.suse.com/security/cve/CVE-2020-8183" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8183/">CVE-2020-8183</cve>
	<bugzilla href="https://bugzilla.suse.com/1178384">SUSE bug 1178384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615778" comment="nextcloud-20.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8184</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A reliance on cookies without validation/integrity check security vulnerability exists in rack &lt; 2.2.3, rack &lt; 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193081">SUSE bug 1193081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8185" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in Rails &lt;6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185</cve>
	<bugzilla href="https://bugzilla.suse.com/1173564">SUSE bug 1173564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612072" comment="rmt-server-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612073" comment="rmt-server-config-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612074" comment="rmt-server-pubcloud-2.6.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8201" ref_url="https://www.suse.com/security/cve/CVE-2020-8201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
    <description>
    Node.js &lt; 12.18.4 and &lt; 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8201/">CVE-2020-8201</cve>
	<bugzilla href="https://bugzilla.suse.com/1176605">SUSE bug 1176605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611443" comment="nodejs12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611444" comment="nodejs12-devel-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611445" comment="nodejs12-docs-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611446" comment="npm12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8228" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8228" ref_url="https://www.suse.com/security/cve/CVE-2020-8228" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8228/">CVE-2020-8228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615778" comment="nextcloud-20.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00069.html" source="SUSE-SU"/>
    <description>
    Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611166" comment="curl-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611167" comment="curl-mini-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611168" comment="libcurl-devel-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611169" comment="libcurl-devel-32bit-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611170" comment="libcurl-mini-devel-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611171" comment="libcurl4-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611172" comment="libcurl4-32bit-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611173" comment="libcurl4-mini-7.66.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8233" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8233" ref_url="https://www.suse.com/security/cve/CVE-2020-8233" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A command injection vulnerability exists in EdgeSwitch firmware &lt;v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-8233/">CVE-2020-8233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615778" comment="nextcloud-20.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" source="SUSE-SU"/>
    <description>
    The implementation of realpath in libuv &lt; 10.22.1, &lt; 12.18.4, and &lt; 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252</cve>
	<bugzilla href="https://bugzilla.suse.com/1176589">SUSE bug 1176589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611448" comment="nodejs10-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611449" comment="nodejs10-devel-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611450" comment="nodejs10-docs-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611443" comment="nodejs12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611444" comment="nodejs12-devel-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611445" comment="nodejs12-docs-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611451" comment="npm10-10.22.1-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611446" comment="npm12-12.18.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8265</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614475" comment="nodejs10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614476" comment="nodejs10-devel-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614477" comment="nodejs10-docs-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614466" comment="nodejs12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614467" comment="nodejs12-devel-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614468" comment="nodejs12-docs-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614484" comment="nodejs14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614485" comment="nodejs14-devel-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614486" comment="nodejs14-docs-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614478" comment="npm10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614469" comment="npm12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614487" comment="npm14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8277</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTWRQJHU72Z3SIFY23FTPWRPBJZFDROF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7UCQ5MCCDUAGSMKN2NKE5XIFE37DNED/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
    <description>
    A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions &lt; 15.2.1, &lt; 14.15.1, and &lt; 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612235" comment="c-ares-devel-1.17.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300208" comment="c-ares-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612236" comment="c-ares-utils-1.17.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300210" comment="c-ares-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612237" comment="libcares2-1.17.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612238" comment="libcares2-32bit-1.17.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153707" comment="libcares2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614466" comment="nodejs12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614467" comment="nodejs12-devel-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614468" comment="nodejs12-docs-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614484" comment="nodejs14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614485" comment="nodejs14-devel-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614486" comment="nodejs14-docs-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614469" comment="npm12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614487" comment="npm14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612440" comment="curl-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612441" comment="curl-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612442" comment="libcurl-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612443" comment="libcurl-devel-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612444" comment="libcurl-mini-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612445" comment="libcurl4-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612446" comment="libcurl4-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612447" comment="libcurl4-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612440" comment="curl-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612441" comment="curl-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612442" comment="libcurl-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612443" comment="libcurl-devel-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612444" comment="libcurl-mini-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612445" comment="libcurl4-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612446" comment="libcurl4-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612447" comment="libcurl4-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8286</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286</cve>
	<bugzilla href="https://bugzilla.suse.com/1179593">SUSE bug 1179593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612440" comment="curl-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612441" comment="curl-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612442" comment="libcurl-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612443" comment="libcurl-devel-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612444" comment="libcurl-mini-devel-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612445" comment="libcurl4-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612446" comment="libcurl4-32bit-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612447" comment="libcurl4-mini-7.66.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8287</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBRCEZ5AUMB5RCV3OQ3WB7MSZEL755XF/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614475" comment="nodejs10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614476" comment="nodejs10-devel-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614477" comment="nodejs10-docs-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614466" comment="nodejs12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614467" comment="nodejs12-devel-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614468" comment="nodejs12-docs-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614484" comment="nodejs14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614485" comment="nodejs14-devel-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614486" comment="nodejs14-docs-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612994" comment="nodejs8-8.17.0-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612995" comment="nodejs8-devel-8.17.0-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612996" comment="nodejs8-docs-8.17.0-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614478" comment="npm10-10.23.1-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614469" comment="npm12-12.20.1-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614487" comment="npm14-14.15.4-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612997" comment="npm8-8.17.0-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8293</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8293" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8293" ref_url="https://www.suse.com/security/cve/CVE-2020-8293" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RL6T5BYT4RSAM4DNXPXTDKBKHKKNDVHW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPTLKOGRYW4NVA4XTNRDXSK534SPTR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8293/">CVE-2020-8293</cve>
	<bugzilla href="https://bugzilla.suse.com/1181445">SUSE bug 1181445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8294</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8294" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8294" ref_url="https://www.suse.com/security/cve/CVE-2020-8294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RL6T5BYT4RSAM4DNXPXTDKBKHKKNDVHW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPTLKOGRYW4NVA4XTNRDXSK534SPTR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    A missing link validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows execution of a stored XSS attack using Internet Explorer when saving a 'javascript:' URL in markdown format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-8294/">CVE-2020-8294</cve>
	<bugzilla href="https://bugzilla.suse.com/1181803">SUSE bug 1181803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8295" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8295" ref_url="https://www.suse.com/security/cve/CVE-2020-8295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RL6T5BYT4RSAM4DNXPXTDKBKHKKNDVHW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPTLKOGRYW4NVA4XTNRDXSK534SPTR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8295/">CVE-2020-8295</cve>
	<bugzilla href="https://bugzilla.suse.com/1181804">SUSE bug 1181804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432</cve>
	<bugzilla href="https://bugzilla.suse.com/1162198">SUSE bug 1162198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611948" comment="u-boot-tools-2020.01-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612581" comment="libpython3_6m1_0-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612582" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612583" comment="python3-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612584" comment="python3-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612585" comment="python3-base-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612586" comment="python3-base-32bit-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612587" comment="python3-curses-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612588" comment="python3-dbm-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612589" comment="python3-devel-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612590" comment="python3-doc-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612591" comment="python3-doc-devhelp-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612592" comment="python3-idle-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612593" comment="python3-testsuite-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612594" comment="python3-tk-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612595" comment="python3-tools-3.6.12-lp152.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8617</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In ISC BIND9 versions BIND 9.11.14 -&gt; 9.11.19, BIND 9.14.9 -&gt; 9.14.12, BIND 9.16.0 -&gt; 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -&gt; 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8620</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.15.6 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.14.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.10.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.10.5-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.9.12 -&gt; 9.9.13, 9.10.7 -&gt; 9.10.8, 9.11.3 -&gt; 9.11.21, 9.12.1 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.12-S1 -&gt; 9.9.13-S1, 9.11.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611584" comment="bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611585" comment="bind-chrootenv-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611586" comment="bind-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611587" comment="bind-devel-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611588" comment="bind-doc-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611589" comment="bind-utils-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611590" comment="libbind9-1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611591" comment="libbind9-1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611592" comment="libdns1605-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611593" comment="libdns1605-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611594" comment="libirs-devel-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611595" comment="libirs1601-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611596" comment="libirs1601-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611597" comment="libisc1606-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611598" comment="libisc1606-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611599" comment="libisccc1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611600" comment="libisccc1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611601" comment="libisccfg1600-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611602" comment="libisccfg1600-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611603" comment="libns1604-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611604" comment="libns1604-32bit-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611605" comment="libuv-devel-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611606" comment="libuv1-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611607" comment="libuv1-32bit-1.18.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611608" comment="python3-bind-9.16.6-lp152.14.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611609" comment="sysuser-shadow-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611610" comment="sysuser-tools-2.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTREZMKE6OIOIY3CLBWV3GIOPB4EM4DX/" source="SUSE-SU"/>
    <description>
    BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -&gt; 9.11.27, 9.12.0 -&gt; 9.16.11, and versions BIND 9.11.3-S1 -&gt; 9.11.27-S1 and 9.16.8-S1 -&gt; 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -&gt; 9.17.1 of the BIND 9.17 development branch
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182483">SUSE bug 1182483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192708">SUSE bug 1192708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613523" comment="bind-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613524" comment="bind-chrootenv-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613525" comment="bind-devel-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613526" comment="bind-devel-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613527" comment="bind-doc-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613528" comment="bind-utils-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613529" comment="libbind9-1600-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613530" comment="libbind9-1600-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613531" comment="libdns1605-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613532" comment="libdns1605-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613533" comment="libirs-devel-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613534" comment="libirs1601-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613535" comment="libirs1601-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613536" comment="libisc1606-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613537" comment="libisc1606-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613538" comment="libisccc1600-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613539" comment="libisccc1600-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613540" comment="libisccfg1600-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613541" comment="libisccfg1600-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613542" comment="libns1604-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613543" comment="libns1604-32bit-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613544" comment="python3-bind-9.16.6-lp152.14.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613057" comment="cluster-md-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613058" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613059" comment="dlm-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613060" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613061" comment="gfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613062" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611991" comment="kernel-debug-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611992" comment="kernel-debug-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611993" comment="kernel-default-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612242" comment="kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612243" comment="kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611994" comment="kernel-default-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611995" comment="kernel-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613063" comment="kernel-devel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611996" comment="kernel-docs-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611997" comment="kernel-docs-html-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611998" comment="kernel-kvmsmall-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611999" comment="kernel-kvmsmall-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612000" comment="kernel-macros-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612001" comment="kernel-obs-build-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612002" comment="kernel-obs-qa-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612003" comment="kernel-preempt-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612004" comment="kernel-preempt-devel-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613064" comment="kernel-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613065" comment="kernel-rt-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613066" comment="kernel-rt-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613067" comment="kernel-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613068" comment="kernel-rt_debug-devel-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613069" comment="kernel-rt_debug-extra-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612005" comment="kernel-source-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613070" comment="kernel-source-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612006" comment="kernel-source-vanilla-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612007" comment="kernel-syms-5.3.18-lp152.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613071" comment="kernel-syms-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613072" comment="kselftests-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613073" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613074" comment="ocfs2-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613075" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613076" comment="reiserfs-kmp-rt-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613077" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612175" comment="ucode-intel-20201118-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612175" comment="ucode-intel-20201118-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612175" comment="ucode-intel-20201118-lp152.2.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8903" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8903" ref_url="https://www.suse.com/security/cve/CVE-2020-8903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "adm" group, users with this role are able to read the DHCP XID from the systemd journal. Using the DHCP XID, it is then possible to set the IP address and hostname of the instance to any value, which is then stored in /etc/hosts. An attacker can then point metadata.google.internal to an arbitrary IP address and impersonate the GCE metadata server which make it is possible to instruct the OS Login PAM module to grant administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "adm" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8903/">CVE-2020-8903</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609989" comment="google-compute-engine-init-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609990" comment="google-compute-engine-oslogin-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609991" comment="google-compute-engine-oslogin-32bit-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8907" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8907" ref_url="https://www.suse.com/security/cve/CVE-2020-8907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8907/">CVE-2020-8907</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609989" comment="google-compute-engine-init-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609990" comment="google-compute-engine-oslogin-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609991" comment="google-compute-engine-oslogin-32bit-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8927</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8927" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBYPFIZJBUFNGB65ETC2USVDXZRAANZW/" source="SUSE-SU"/>
    <description>
    A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927</cve>
	<bugzilla href="https://bugzilla.suse.com/1175825">SUSE bug 1175825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611395" comment="brotli-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294770" comment="brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611396" comment="libbrotli-devel-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294771" comment="libbrotli-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611397" comment="libbrotlicommon1-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294772" comment="libbrotlicommon1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611398" comment="libbrotlicommon1-32bit-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294773" comment="libbrotlicommon1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611399" comment="libbrotlidec1-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294774" comment="libbrotlidec1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611400" comment="libbrotlidec1-32bit-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294775" comment="libbrotlidec1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611401" comment="libbrotlienc1-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294776" comment="libbrotlienc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009611402" comment="libbrotlienc1-32bit-1.0.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294777" comment="libbrotlienc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8933" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8933" ref_url="https://www.suse.com/security/cve/CVE-2020-8933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using the membership to the "lxd" group, an attacker can attach host devices and filesystems. Within an lxc container, it is possible to attach the host OS filesystem and modify /etc/sudoers to then gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "lxd" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8933/">CVE-2020-8933</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609989" comment="google-compute-engine-init-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609990" comment="google-compute-engine-oslogin-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609991" comment="google-compute-engine-oslogin-32bit-20190801-lp152.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9327</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625515" comment="libsqlite3-0-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625516" comment="libsqlite3-0-32bit-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625517" comment="sqlite3-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625518" comment="sqlite3-devel-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625519" comment="sqlite3-doc-3.36.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610736" comment="apache2-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610737" comment="apache2-devel-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610738" comment="apache2-doc-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610739" comment="apache2-event-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610740" comment="apache2-example-pages-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610741" comment="apache2-prefork-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610742" comment="apache2-utils-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610743" comment="apache2-worker-2.4.43-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9893</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9894</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9895</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9915</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610703" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610704" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610705" comment="libwebkit2gtk-4_0-37-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610706" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610707" comment="libwebkit2gtk3-lang-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610708" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610709" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610710" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610711" comment="webkit-jsc-4-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610713" comment="webkit2gtk3-devel-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009610714" comment="webkit2gtk3-minibrowser-2.28.4-lp152.2.4.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9948</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612500" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612501" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612502" comment="libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612503" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612504" comment="libwebkit2gtk3-lang-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612505" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612506" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612507" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612508" comment="webkit-jsc-4-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612509" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612510" comment="webkit2gtk3-devel-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612511" comment="webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612500" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612501" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612502" comment="libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612503" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612504" comment="libwebkit2gtk3-lang-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612505" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612506" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612507" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612508" comment="webkit-jsc-4-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612509" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612510" comment="webkit2gtk3-devel-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612511" comment="webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612500" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612501" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612502" comment="libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612503" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612504" comment="libwebkit2gtk3-lang-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612505" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612506" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612507" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612508" comment="webkit-jsc-4-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612509" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612510" comment="webkit2gtk3-devel-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612511" comment="webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0089</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0326</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI2F4UP2SUM3KDNM2O5RK57I3NEYBJ26/" source="SUSE-SU"/>
    <description>
    In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613179" comment="wpa_supplicant-2.9-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613180" comment="wpa_supplicant-gui-2.9-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0342</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009202.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0605</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188381">SUSE bug 1188381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0941</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614168" comment="clamav-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614169" comment="clamav-devel-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614170" comment="libclamav9-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614171" comment="libfreshclam2-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1404</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614168" comment="clamav-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614169" comment="clamav-devel-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614170" comment="libclamav9-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614171" comment="libfreshclam2-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1405</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614168" comment="clamav-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614169" comment="clamav-devel-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614170" comment="libclamav9-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614171" comment="libfreshclam2-0.103.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1801</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1870</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1871</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614435" comment="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614436" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614437" comment="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614438" comment="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614439" comment="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614440" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614441" comment="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614442" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614443" comment="webkit-jsc-4-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614444" comment="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614445" comment="webkit2gtk3-devel-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614446" comment="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20176</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJUC2DLRAUEA76AUONRX7RN5HCFF25LX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3996-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJDAKFUPFUQCL6CS2YBK2EAJXXFEXMKK/" source="SUSE-SU"/>
    <description>
    A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182326">SUSE bug 1182326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659764" comment="ImageMagick-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659765" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659766" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659767" comment="ImageMagick-devel-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659768" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659769" comment="ImageMagick-doc-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659770" comment="ImageMagick-extra-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659771" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659772" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659773" comment="libMagick++-devel-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659774" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659775" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659776" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659777" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659778" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659779" comment="perl-PerlMagick-7.0.7.34-lp152.12.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20181</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613444" comment="qemu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613445" comment="qemu-arm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613446" comment="qemu-audio-alsa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613447" comment="qemu-audio-pa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613448" comment="qemu-audio-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613449" comment="qemu-block-curl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613450" comment="qemu-block-dmg-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613451" comment="qemu-block-gluster-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613452" comment="qemu-block-iscsi-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613453" comment="qemu-block-nfs-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613454" comment="qemu-block-rbd-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613455" comment="qemu-block-ssh-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613456" comment="qemu-extra-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613457" comment="qemu-guest-agent-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613458" comment="qemu-ipxe-1.0.0+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613459" comment="qemu-ksm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613460" comment="qemu-kvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613461" comment="qemu-lang-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613462" comment="qemu-linux-user-4.2.1-lp152.9.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613463" comment="qemu-microvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613464" comment="qemu-ppc-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613465" comment="qemu-s390-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613466" comment="qemu-seabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613467" comment="qemu-sgabios-8-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613468" comment="qemu-testsuite-4.2.1-lp152.9.9.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613469" comment="qemu-tools-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613470" comment="qemu-ui-curses-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613471" comment="qemu-ui-gtk-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613472" comment="qemu-ui-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613473" comment="qemu-ui-spice-app-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613474" comment="qemu-vgabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613475" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613476" comment="qemu-x86-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20190</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20190" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20190" ref_url="https://www.suse.com/security/cve/CVE-2021-20190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008253.html" source="SUSE-SU"/>
    <description>
    A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20190/">CVE-2021-20190</cve>
	<bugzilla href="https://bugzilla.suse.com/1181118">SUSE bug 1181118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613002" comment="jackson-databind-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342652" comment="jackson-databind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613003" comment="jackson-databind-javadoc-2.10.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342653" comment="jackson-databind-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRDSUUE3LUKBDRLPB7GTT5QZRPV5J7O4/" source="SUSE-SU"/>
    <description>
    A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613931" comment="tar-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613932" comment="tar-backup-scripts-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153774" comment="tar-backup-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613933" comment="tar-doc-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251575" comment="tar-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613934" comment="tar-lang-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151392" comment="tar-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613935" comment="tar-rmt-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177166" comment="tar-rmt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613936" comment="tar-tests-1.30-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153775" comment="tar-tests is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AINSWYQLD5FH4GUOEP5FWWA5CMFHTUDX/" source="SUSE-SU"/>
    <description>
    A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615066" comment="libspice-server-devel-0.14.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615067" comment="libspice-server1-0.14.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613444" comment="qemu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613445" comment="qemu-arm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613446" comment="qemu-audio-alsa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613447" comment="qemu-audio-pa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613448" comment="qemu-audio-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613449" comment="qemu-block-curl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613450" comment="qemu-block-dmg-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613451" comment="qemu-block-gluster-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613452" comment="qemu-block-iscsi-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613453" comment="qemu-block-nfs-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613454" comment="qemu-block-rbd-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613455" comment="qemu-block-ssh-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613456" comment="qemu-extra-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613457" comment="qemu-guest-agent-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613458" comment="qemu-ipxe-1.0.0+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613459" comment="qemu-ksm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613460" comment="qemu-kvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613461" comment="qemu-lang-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613462" comment="qemu-linux-user-4.2.1-lp152.9.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613463" comment="qemu-microvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613464" comment="qemu-ppc-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613465" comment="qemu-s390-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613466" comment="qemu-seabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613467" comment="qemu-sgabios-8-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613468" comment="qemu-testsuite-4.2.1-lp152.9.9.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613469" comment="qemu-tools-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613470" comment="qemu-ui-curses-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613471" comment="qemu-ui-gtk-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613472" comment="qemu-ui-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613473" comment="qemu-ui-spice-app-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613474" comment="qemu-vgabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613475" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613476" comment="qemu-x86-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20204" ref_url="https://www.suse.com/security/cve/CVE-2021-20204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLVFS4U5WQY3UT4TIXF3TKNGVMQCDKHC/" source="SUSE-SU"/>
    <description>
    A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbitrary code execution or privilege escalation depending on input/skills of attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20204/">CVE-2021-20204</cve>
	<bugzilla href="https://bugzilla.suse.com/1186251">SUSE bug 1186251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662394" comment="getdata-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662405" comment="getdata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662395" comment="getdata-devel-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662406" comment="getdata-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662396" comment="getdata-doc-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662407" comment="getdata-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662397" comment="libf95getdata7-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662408" comment="libf95getdata7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662398" comment="libfgetdata6-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662409" comment="libfgetdata6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662399" comment="libgetdata++7-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662410" comment="libgetdata++7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662400" comment="libgetdata8-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662411" comment="libgetdata8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662401" comment="perl-getdata-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662412" comment="perl-getdata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662402" comment="python-getdata-0.11.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662413" comment="python-getdata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20208" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/65NUX6IGI72XJIWLCF5QOKIKAWWJUMEY/" source="SUSE-SU"/>
    <description>
    A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208</cve>
	<bugzilla href="https://bugzilla.suse.com/1183239">SUSE bug 1183239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614463" comment="cifs-utils-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614464" comment="cifs-utils-devel-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294754" comment="cifs-utils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614465" comment="pam_cifscreds-6.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294755" comment="pam_cifscreds is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20216" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20216" ref_url="https://www.suse.com/security/cve/CVE-2021-20216" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYXYETZZHYGLBE3WLXSZCYBO5VDRKFDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OB5C3CKHSROKXDMILX7JOD3PKW2CMF6X/" source="SUSE-SU"/>
    <description>
    A flaw was found in Privoxy in versions before 3.0.31. A memory leak that occurs when decompression fails unexpectedly may lead to a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-20216/">CVE-2021-20216</cve>
	<bugzilla href="https://bugzilla.suse.com/1181650">SUSE bug 1181650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613108" comment="privoxy-3.0.31-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613109" comment="privoxy-doc-3.0.31-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20217" ref_url="https://www.suse.com/security/cve/CVE-2021-20217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYXYETZZHYGLBE3WLXSZCYBO5VDRKFDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OB5C3CKHSROKXDMILX7JOD3PKW2CMF6X/" source="SUSE-SU"/>
    <description>
    A flaw was found in Privoxy in versions before 3.0.31. An assertion failure triggered by a crafted CGI request may lead to denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-20217/">CVE-2021-20217</cve>
	<bugzilla href="https://bugzilla.suse.com/1181650">SUSE bug 1181650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613108" comment="privoxy-3.0.31-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613109" comment="privoxy-doc-3.0.31-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613444" comment="qemu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613445" comment="qemu-arm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613446" comment="qemu-audio-alsa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613447" comment="qemu-audio-pa-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613448" comment="qemu-audio-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613449" comment="qemu-block-curl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613450" comment="qemu-block-dmg-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613451" comment="qemu-block-gluster-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613452" comment="qemu-block-iscsi-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613453" comment="qemu-block-nfs-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613454" comment="qemu-block-rbd-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613455" comment="qemu-block-ssh-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613456" comment="qemu-extra-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613457" comment="qemu-guest-agent-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613458" comment="qemu-ipxe-1.0.0+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613459" comment="qemu-ksm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613460" comment="qemu-kvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613461" comment="qemu-lang-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613462" comment="qemu-linux-user-4.2.1-lp152.9.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613463" comment="qemu-microvm-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613464" comment="qemu-ppc-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613465" comment="qemu-s390-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613466" comment="qemu-seabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613467" comment="qemu-sgabios-8-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613468" comment="qemu-testsuite-4.2.1-lp152.9.9.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613469" comment="qemu-tools-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613470" comment="qemu-ui-curses-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613471" comment="qemu-ui-gtk-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613472" comment="qemu-ui-sdl-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613473" comment="qemu-ui-spice-app-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613474" comment="qemu-vgabios-1.12.1+-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613475" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613476" comment="qemu-x86-4.2.1-lp152.9.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20230</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20230" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20230" ref_url="https://www.suse.com/security/cve/CVE-2021-20230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVLGFTQ3NKK4IRG4YXB6DPOVNR7D5IAU/" source="SUSE-SU"/>
    <description>
    A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20230/">CVE-2021-20230</cve>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613690" comment="stunnel-5.57-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347478" comment="stunnel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613691" comment="stunnel-doc-5.57-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347479" comment="stunnel-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231</cve>
	<bugzilla href="https://bugzilla.suse.com/1183457">SUSE bug 1183457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613837" comment="gnutls-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613838" comment="gnutls-guile-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613839" comment="libgnutls-dane-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613840" comment="libgnutls-dane0-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613841" comment="libgnutls-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613842" comment="libgnutls-devel-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613843" comment="libgnutls30-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613844" comment="libgnutls30-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613845" comment="libgnutls30-hmac-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613846" comment="libgnutls30-hmac-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613847" comment="libgnutlsxx-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613848" comment="libgnutlsxx28-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232</cve>
	<bugzilla href="https://bugzilla.suse.com/1183456">SUSE bug 1183456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613837" comment="gnutls-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613838" comment="gnutls-guile-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613839" comment="libgnutls-dane-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613840" comment="libgnutls-dane0-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613841" comment="libgnutls-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613842" comment="libgnutls-devel-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613843" comment="libgnutls30-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613844" comment="libgnutls30-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613845" comment="libgnutls30-hmac-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613846" comment="libgnutls30-hmac-32bit-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613847" comment="libgnutlsxx-devel-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613848" comment="libgnutlsxx28-3.6.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183135">SUSE bug 1183135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613810" comment="grub2-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613811" comment="grub2-branding-upstream-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613812" comment="grub2-i386-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613813" comment="grub2-i386-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291437" comment="grub2-i386-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613814" comment="grub2-i386-pc-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613815" comment="grub2-i386-pc-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613816" comment="grub2-i386-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613817" comment="grub2-snapper-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613818" comment="grub2-systemd-sleep-plugin-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613819" comment="grub2-x86_64-efi-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613820" comment="grub2-x86_64-efi-debug-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613821" comment="grub2-x86_64-xen-2.04-lp152.7.22.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20241</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241</cve>
	<bugzilla href="https://bugzilla.suse.com/1182335">SUSE bug 1182335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613557" comment="ImageMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613558" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613559" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613560" comment="ImageMagick-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613561" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613562" comment="ImageMagick-doc-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613563" comment="ImageMagick-extra-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613564" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613565" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613566" comment="libMagick++-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613567" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613568" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613569" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613570" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613571" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613572" comment="perl-PerlMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20243</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613557" comment="ImageMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613558" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613559" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613560" comment="ImageMagick-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613561" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613562" comment="ImageMagick-doc-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613563" comment="ImageMagick-extra-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613564" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613565" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613566" comment="libMagick++-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613567" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613568" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613569" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613570" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613571" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613572" comment="perl-PerlMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20244</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613557" comment="ImageMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613558" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613559" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613560" comment="ImageMagick-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613561" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613562" comment="ImageMagick-doc-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613563" comment="ImageMagick-extra-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613564" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613565" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613566" comment="libMagick++-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613567" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613568" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613569" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613570" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613571" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613572" comment="perl-PerlMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20246</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613557" comment="ImageMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613558" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613559" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613560" comment="ImageMagick-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613561" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613562" comment="ImageMagick-doc-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613563" comment="ImageMagick-extra-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613564" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613565" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613566" comment="libMagick++-devel-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613567" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613568" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613569" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613570" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613571" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613572" comment="perl-PerlMagick-7.0.7.34-lp152.12.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20247" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20247" ref_url="https://www.suse.com/security/cve/CVE-2021-20247" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0516-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JHTHLJJZ7MOC6CJIECK5ALGTVO4U32PO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0533-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CUG4AQOC7O5ZIO7I7EZZLO7RH35I3UPI/" source="SUSE-SU"/>
    <description>
    A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access data outside the designated mailbox on the opposite end of the synchronization channel. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20247/">CVE-2021-20247</cve>
	<bugzilla href="https://bugzilla.suse.com/1182488">SUSE bug 1182488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613974" comment="isync-1.3.5-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350656" comment="isync is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185886">SUSE bug 1185886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189860">SUSE bug 1189860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614354" comment="ctdb-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614355" comment="ctdb-pcp-pmda-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614356" comment="ctdb-tests-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614357" comment="libdcerpc-binding0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614358" comment="libdcerpc-binding0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614359" comment="libdcerpc-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614360" comment="libdcerpc-samr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614361" comment="libdcerpc-samr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614362" comment="libdcerpc-samr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614363" comment="libdcerpc0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614364" comment="libdcerpc0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614365" comment="libndr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614366" comment="libndr-krb5pac-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614367" comment="libndr-krb5pac0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614368" comment="libndr-krb5pac0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614369" comment="libndr-nbt-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614370" comment="libndr-nbt0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614371" comment="libndr-nbt0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614372" comment="libndr-standard-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614373" comment="libndr-standard0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614374" comment="libndr-standard0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614375" comment="libndr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614376" comment="libndr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614377" comment="libnetapi-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614378" comment="libnetapi-devel-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614379" comment="libnetapi0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614380" comment="libnetapi0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614381" comment="libsamba-credentials-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614382" comment="libsamba-credentials0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614383" comment="libsamba-credentials0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614384" comment="libsamba-errors-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614385" comment="libsamba-errors0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614386" comment="libsamba-errors0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614387" comment="libsamba-hostconfig-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614388" comment="libsamba-hostconfig0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614389" comment="libsamba-hostconfig0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614390" comment="libsamba-passdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614391" comment="libsamba-passdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614392" comment="libsamba-passdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614393" comment="libsamba-policy-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614394" comment="libsamba-policy-python3-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614395" comment="libsamba-policy0-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614396" comment="libsamba-policy0-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614397" comment="libsamba-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614398" comment="libsamba-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614399" comment="libsamba-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614400" comment="libsamdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614401" comment="libsamdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614402" comment="libsamdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614403" comment="libsmbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614404" comment="libsmbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614405" comment="libsmbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614406" comment="libsmbconf-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614407" comment="libsmbconf0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614408" comment="libsmbconf0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614409" comment="libsmbldap-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614410" comment="libsmbldap2-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614411" comment="libsmbldap2-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614412" comment="libtevent-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614413" comment="libtevent-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614414" comment="libtevent-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614415" comment="libwbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614416" comment="libwbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614417" comment="libwbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614418" comment="samba-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614419" comment="samba-ad-dc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614420" comment="samba-ad-dc-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614421" comment="samba-ceph-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614422" comment="samba-client-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614423" comment="samba-client-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614424" comment="samba-core-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614425" comment="samba-doc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614426" comment="samba-dsdb-modules-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614427" comment="samba-libs-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614428" comment="samba-libs-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614429" comment="samba-libs-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614430" comment="samba-libs-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614431" comment="samba-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614432" comment="samba-test-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614433" comment="samba-winbind-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614434" comment="samba-winbind-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20255</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20255" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20257</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20266</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652636" comment="python2-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231455" comment="python2-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652637" comment="python3-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231456" comment="python3-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652638" comment="rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652639" comment="rpm-32bit-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151944" comment="rpm-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652640" comment="rpm-build-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151945" comment="rpm-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652641" comment="rpm-devel-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151946" comment="rpm-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20270</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20270" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT4EGNCPUYIMTYR7NYWL7QYVREFIK566/" source="SUSE-SU"/>
    <description>
    An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270</cve>
	<bugzilla href="https://bugzilla.suse.com/1183169">SUSE bug 1183169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653785" comment="python3-Pygments-2.6.1-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350179" comment="python3-Pygments is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20271</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
    <description>
    A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652636" comment="python2-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231455" comment="python2-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652637" comment="python3-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231456" comment="python3-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652638" comment="rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652639" comment="rpm-32bit-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151944" comment="rpm-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652640" comment="rpm-build-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151945" comment="rpm-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652641" comment="rpm-devel-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151946" comment="rpm-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20272</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20272" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20272" ref_url="https://www.suse.com/security/cve/CVE-2021-20272" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFUTCP522RHVYR5DDZPU4P3YHFZXBVYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NB5FOTUR2SOWL7YMKEJTBMYYI245FRZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in privoxy before 3.0.32. An assertion failure could be triggered with a crafted CGI request leading to server crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20272/">CVE-2021-20272</cve>
	<bugzilla href="https://bugzilla.suse.com/1183129">SUSE bug 1183129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613795" comment="privoxy-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613796" comment="privoxy-doc-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20273</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20273" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20273" ref_url="https://www.suse.com/security/cve/CVE-2021-20273" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFUTCP522RHVYR5DDZPU4P3YHFZXBVYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NB5FOTUR2SOWL7YMKEJTBMYYI245FRZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in privoxy before 3.0.32. A crash can occur via a crafted CGI request if Privoxy is toggled off.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20273/">CVE-2021-20273</cve>
	<bugzilla href="https://bugzilla.suse.com/1183129">SUSE bug 1183129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613795" comment="privoxy-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613796" comment="privoxy-doc-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20274</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20274" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20274" ref_url="https://www.suse.com/security/cve/CVE-2021-20274" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFUTCP522RHVYR5DDZPU4P3YHFZXBVYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NB5FOTUR2SOWL7YMKEJTBMYYI245FRZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in privoxy before 3.0.32. A crash may occur due a NULL-pointer dereference when the socks server misbehaves.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20274/">CVE-2021-20274</cve>
	<bugzilla href="https://bugzilla.suse.com/1183129">SUSE bug 1183129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613795" comment="privoxy-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613796" comment="privoxy-doc-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20275" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20275" ref_url="https://www.suse.com/security/cve/CVE-2021-20275" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFUTCP522RHVYR5DDZPU4P3YHFZXBVYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NB5FOTUR2SOWL7YMKEJTBMYYI245FRZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in privoxy before 3.0.32. A invalid read of size two may occur in chunked_body_is_complete() leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20275/">CVE-2021-20275</cve>
	<bugzilla href="https://bugzilla.suse.com/1183129">SUSE bug 1183129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613795" comment="privoxy-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613796" comment="privoxy-doc-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20276</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20276" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20276" ref_url="https://www.suse.com/security/cve/CVE-2021-20276" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFUTCP522RHVYR5DDZPU4P3YHFZXBVYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NB5FOTUR2SOWL7YMKEJTBMYYI245FRZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in privoxy before 3.0.32. Invalid memory access with an invalid pattern passed to pcre_compile() may lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20276/">CVE-2021-20276</cve>
	<bugzilla href="https://bugzilla.suse.com/1183129">SUSE bug 1183129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613795" comment="privoxy-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613796" comment="privoxy-doc-3.0.32-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20277</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0469-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLNA72I7E6KKMIQOHXHYRPDYGMW5KH4K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614354" comment="ctdb-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614355" comment="ctdb-pcp-pmda-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614356" comment="ctdb-tests-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613830" comment="ldb-tools-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614357" comment="libdcerpc-binding0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614358" comment="libdcerpc-binding0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614359" comment="libdcerpc-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614360" comment="libdcerpc-samr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614361" comment="libdcerpc-samr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614362" comment="libdcerpc-samr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614363" comment="libdcerpc0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614364" comment="libdcerpc0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613831" comment="libldb-devel-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613832" comment="libldb2-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613833" comment="libldb2-32bit-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291436" comment="libldb2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614365" comment="libndr-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614366" comment="libndr-krb5pac-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614367" comment="libndr-krb5pac0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614368" comment="libndr-krb5pac0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614369" comment="libndr-nbt-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614370" comment="libndr-nbt0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614371" comment="libndr-nbt0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614372" comment="libndr-standard-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614373" comment="libndr-standard0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614374" comment="libndr-standard0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614375" comment="libndr0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614376" comment="libndr0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614377" comment="libnetapi-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614378" comment="libnetapi-devel-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614379" comment="libnetapi0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614380" comment="libnetapi0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614381" comment="libsamba-credentials-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614382" comment="libsamba-credentials0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614383" comment="libsamba-credentials0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614384" comment="libsamba-errors-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614385" comment="libsamba-errors0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614386" comment="libsamba-errors0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614387" comment="libsamba-hostconfig-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614388" comment="libsamba-hostconfig0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614389" comment="libsamba-hostconfig0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614390" comment="libsamba-passdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614391" comment="libsamba-passdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614392" comment="libsamba-passdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614393" comment="libsamba-policy-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614394" comment="libsamba-policy-python3-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614395" comment="libsamba-policy0-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614396" comment="libsamba-policy0-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614397" comment="libsamba-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614398" comment="libsamba-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614399" comment="libsamba-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614400" comment="libsamdb-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614401" comment="libsamdb0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614402" comment="libsamdb0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614403" comment="libsmbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614404" comment="libsmbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614405" comment="libsmbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614406" comment="libsmbconf-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614407" comment="libsmbconf0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614408" comment="libsmbconf0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614409" comment="libsmbldap-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614410" comment="libsmbldap2-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614411" comment="libsmbldap2-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614412" comment="libtevent-util-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614413" comment="libtevent-util0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614414" comment="libtevent-util0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614415" comment="libwbclient-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614416" comment="libwbclient0-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614417" comment="libwbclient0-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613834" comment="python3-ldb-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613835" comment="python3-ldb-32bit-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613836" comment="python3-ldb-devel-2.0.12-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614418" comment="samba-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614419" comment="samba-ad-dc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614420" comment="samba-ad-dc-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614421" comment="samba-ceph-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614422" comment="samba-client-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614423" comment="samba-client-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614424" comment="samba-core-devel-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614425" comment="samba-doc-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614426" comment="samba-dsdb-modules-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614427" comment="samba-libs-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614428" comment="samba-libs-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614429" comment="samba-libs-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614430" comment="samba-libs-python3-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614431" comment="samba-python3-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614432" comment="samba-test-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614433" comment="samba-winbind-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614434" comment="samba-winbind-32bit-4.11.14+git.247.8c858f7ee14-lp152.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20288</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F27MV75T6ENOALLCPSWOQKELO26I3HCZ/" source="SUSE-SU"/>
    <description>
    An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288</cve>
	<bugzilla href="https://bugzilla.suse.com/1183074">SUSE bug 1183074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614517" comment="ceph-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614518" comment="ceph-base-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614519" comment="ceph-common-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614520" comment="ceph-fuse-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614521" comment="ceph-grafana-dashboards-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614522" comment="ceph-immutable-object-cache-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614523" comment="ceph-mds-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614524" comment="ceph-mgr-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614525" comment="ceph-mgr-cephadm-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614526" comment="ceph-mgr-dashboard-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614527" comment="ceph-mgr-diskprediction-cloud-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614528" comment="ceph-mgr-diskprediction-local-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614529" comment="ceph-mgr-k8sevents-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614530" comment="ceph-mgr-modules-core-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614531" comment="ceph-mgr-rook-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614532" comment="ceph-mon-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614533" comment="ceph-osd-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614534" comment="ceph-prometheus-alerts-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614535" comment="ceph-radosgw-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614536" comment="ceph-test-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614537" comment="cephadm-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614538" comment="cephfs-shell-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614539" comment="libcephfs-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614540" comment="libcephfs2-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614541" comment="librados-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614542" comment="librados2-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614543" comment="libradospp-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614544" comment="librbd-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614545" comment="librbd1-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614546" comment="librgw-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614547" comment="librgw2-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614548" comment="python3-ceph-argparse-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614549" comment="python3-ceph-common-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614550" comment="python3-cephfs-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614551" comment="python3-rados-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614552" comment="python3-rbd-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614553" comment="python3-rgw-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614554" comment="rados-objclass-devel-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614555" comment="rbd-fuse-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614556" comment="rbd-mirror-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614557" comment="rbd-nbd-15.2.11.83+g8a15f484c2-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20294</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6GNK27D6NPRSWPQWFJADKDTOHPOGY6C/" source="SUSE-SU"/>
    <description>
    A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196680">SUSE bug 1196680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20296</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20296" ref_url="https://www.suse.com/security/cve/CVE-2021-20296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20296/">CVE-2021-20296</cve>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184355">SUSE bug 1184355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614510" comment="libIlmImf-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614511" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614512" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614513" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614514" comment="openexr-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614515" comment="openexr-devel-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614516" comment="openexr-doc-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20298</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20298" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20299</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299</cve>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20300</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20302</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20302" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302</cve>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20303</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20303" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20304</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20304" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEQQBLTWQPDTYRTWQZSXENUU6TSCBJ5R/" source="SUSE-SU"/>
    <description>
    A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA &amp; ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305</cve>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614347" comment="libhogweed4-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177221" comment="libhogweed4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614348" comment="libhogweed4-32bit-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242425" comment="libhogweed4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614349" comment="libnettle-devel-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614350" comment="libnettle-devel-32bit-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614351" comment="libnettle6-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177222" comment="libnettle6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614352" comment="libnettle6-32bit-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242426" comment="libnettle6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614353" comment="nettle-3.4.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20308" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20308" ref_url="https://www.suse.com/security/cve/CVE-2021-20308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0882-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RXMQHLXPNKTCGM4HNTMLHF7NWL3ZXKIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPXU4F6ZSTM4YH5LRPXTC4IKPPHYHIMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SBHXPTEDODFUJSSP4XPVQOKK5PUKOPN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CULAAKX3HOT4A6XWUQNE3XVTQ7FRWP5M/" source="SUSE-SU"/>
    <description>
    Integer overflow in the htmldoc 1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service that is similar to CVE-2017-9181.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20308/">CVE-2021-20308</cve>
	<bugzilla href="https://bugzilla.suse.com/1184424">SUSE bug 1184424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615083" comment="htmldoc-1.9.12-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151341" comment="htmldoc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPPJFFJWUIW3K6NB472QVFG522DWQZET/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614285" comment="ImageMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614286" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614287" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614288" comment="ImageMagick-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614289" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614290" comment="ImageMagick-doc-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614291" comment="ImageMagick-extra-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614292" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614293" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614294" comment="libMagick++-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614295" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614296" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614297" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614298" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614299" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614300" comment="perl-PerlMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20311" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPPJFFJWUIW3K6NB472QVFG522DWQZET/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311</cve>
	<bugzilla href="https://bugzilla.suse.com/1184626">SUSE bug 1184626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614285" comment="ImageMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614286" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614287" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614288" comment="ImageMagick-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614289" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614290" comment="ImageMagick-doc-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614291" comment="ImageMagick-extra-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614292" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614293" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614294" comment="libMagick++-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614295" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614296" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614297" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614298" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614299" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614300" comment="perl-PerlMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20312</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPPJFFJWUIW3K6NB472QVFG522DWQZET/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614285" comment="ImageMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614286" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614287" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614288" comment="ImageMagick-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614289" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614290" comment="ImageMagick-doc-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614291" comment="ImageMagick-extra-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614292" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614293" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614294" comment="libMagick++-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614295" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614296" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614297" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614298" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614299" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614300" comment="perl-PerlMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20313</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPPJFFJWUIW3K6NB472QVFG522DWQZET/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614285" comment="ImageMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614286" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614287" comment="ImageMagick-config-7-upstream-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614288" comment="ImageMagick-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614289" comment="ImageMagick-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614290" comment="ImageMagick-doc-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614291" comment="ImageMagick-extra-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614292" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614293" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614294" comment="libMagick++-devel-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614295" comment="libMagick++-devel-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614296" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614297" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614298" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614299" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614300" comment="perl-PerlMagick-7.0.7.34-lp152.12.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20314" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20314" ref_url="https://www.suse.com/security/cve/CVE-2021-20314" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLLSVZFKUI7FKS5LSGOHVGEIIGA7GFO/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20314/">CVE-2021-20314</cve>
	<bugzilla href="https://bugzilla.suse.com/1189104">SUSE bug 1189104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631864" comment="libspf2-2-1.2.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631797" comment="libspf2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631865" comment="libspf2-devel-1.2.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631798" comment="libspf2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631866" comment="libspf2-tools-1.2.10-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631799" comment="libspf2-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20322</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193290">SUSE bug 1193290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2074" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2074" ref_url="https://www.suse.com/security/cve/CVE-2021-2074" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOZDUDAVWBPMEHQXT2I4NXOMGVCWB5BM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RTNW7ZRCP2VD6YMPAHFC7MY4YIB5GTL/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2074/">CVE-2021-2074</cve>
	<bugzilla href="https://bugzilla.suse.com/1181197">SUSE bug 1181197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181199">SUSE bug 1181199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614322" comment="python3-virtualbox-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614323" comment="virtualbox-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614324" comment="virtualbox-devel-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614325" comment="virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614326" comment="virtualbox-guest-source-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614327" comment="virtualbox-guest-tools-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614328" comment="virtualbox-guest-x11-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614329" comment="virtualbox-host-source-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614330" comment="virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614331" comment="virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614332" comment="virtualbox-qt-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614333" comment="virtualbox-vnc-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614334" comment="virtualbox-websrv-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21106</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21106" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21106" ref_url="https://www.suse.com/security/cve/CVE-2021-21106" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21106/">CVE-2021-21106</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21107</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21107" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21107" ref_url="https://www.suse.com/security/cve/CVE-2021-21107" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21107/">CVE-2021-21107</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21108" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21108" ref_url="https://www.suse.com/security/cve/CVE-2021-21108" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21108/">CVE-2021-21108</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21109</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21109" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21109" ref_url="https://www.suse.com/security/cve/CVE-2021-21109" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21109/">CVE-2021-21109</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21110</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21110" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21110" ref_url="https://www.suse.com/security/cve/CVE-2021-21110" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21110/">CVE-2021-21110</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21111</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21111" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21111" ref_url="https://www.suse.com/security/cve/CVE-2021-21111" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21111/">CVE-2021-21111</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21112" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21112" ref_url="https://www.suse.com/security/cve/CVE-2021-21112" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21112/">CVE-2021-21112</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21113" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21113" ref_url="https://www.suse.com/security/cve/CVE-2021-21113" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21113/">CVE-2021-21113</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21114" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21114" ref_url="https://www.suse.com/security/cve/CVE-2021-21114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21114/">CVE-2021-21114</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21115" ref_url="https://www.suse.com/security/cve/CVE-2021-21115" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21115/">CVE-2021-21115</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21116" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21116" ref_url="https://www.suse.com/security/cve/CVE-2021-21116" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21116/">CVE-2021-21116</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612944" comment="opera-73.0.3856.344-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613635" comment="chromedriver-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613636" comment="chromium-87.0.4280.141-lp152.2.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21117" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21117" ref_url="https://www.suse.com/security/cve/CVE-2021-21117" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21117/">CVE-2021-21117</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21118" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21119</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21119" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Media in Google Chrome prior to 88.0.4324.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21120</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21120" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21121</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21121" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21122</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21123</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21123" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21124</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21124" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21124" ref_url="https://www.suse.com/security/cve/CVE-2021-21124" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21124/">CVE-2021-21124</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21125" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21126" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21127</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21127" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21128</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21128" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21130" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21131</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21131" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21132</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21132" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21133" ref_url="https://www.suse.com/security/cve/CVE-2021-21133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21133/">CVE-2021-21133</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21134</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21134" ref_url="https://www.suse.com/security/cve/CVE-2021-21134" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21134/">CVE-2021-21134</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21136" ref_url="https://www.suse.com/security/cve/CVE-2021-21136" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21136/">CVE-2021-21136</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21137" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21138</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21138" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21138" ref_url="https://www.suse.com/security/cve/CVE-2021-21138" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21138/">CVE-2021-21138</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21139" ref_url="https://www.suse.com/security/cve/CVE-2021-21139" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21139/">CVE-2021-21139</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21140</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21141" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612986" comment="chromedriver-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612987" comment="chromium-88.0.4324.96-lp152.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21142</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21142" ref_url="https://www.suse.com/security/cve/CVE-2021-21142" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
    <description>
    Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21142/">CVE-2021-21142</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21143" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21143" ref_url="https://www.suse.com/security/cve/CVE-2021-21143" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21143/">CVE-2021-21143</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21144</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21144" ref_url="https://www.suse.com/security/cve/CVE-2021-21144" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21144/">CVE-2021-21144</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Fonts in Google Chrome prior to 88.0.4324.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21146</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21147</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCYZBSKAQDG7SYKEXASEZQODBJQKCMUZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM5J73PFE6RAAP7ZYV2S2F6NISQVSMLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Skia in Google Chrome prior to 88.0.4324.146 allowed a local attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147</cve>
	<bugzilla href="https://bugzilla.suse.com/1181772">SUSE bug 1181772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613095" comment="chromedriver-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613096" comment="chromium-88.0.4324.146-lp152.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21148</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0267-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZEZQO2PMEYX4NTXGJYF3SK3LVAZ4AS2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRRV235H6DBC62DZZGTBUASQEOYUJUOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3D452OYQTKXJQRO2OWRU5IM6SC2Y3TK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148</cve>
	<bugzilla href="https://bugzilla.suse.com/1181827">SUSE bug 1181827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613110" comment="chromedriver-88.0.4324.150-lp152.2.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613111" comment="chromium-88.0.4324.150-lp152.2.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21149</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in Data Transfer in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21150</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21150" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Downloads in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21151</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21151" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21151" ref_url="https://www.suse.com/security/cve/CVE-2021-21151" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
    <description>
    Use after free in Payments in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21151/">CVE-2021-21151</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21152</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21152" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Media in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21153</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in GPU Process in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21154" ref_url="https://www.suse.com/security/cve/CVE-2021-21154" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Tab Strip in Google Chrome prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21154/">CVE-2021-21154</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21155" ref_url="https://www.suse.com/security/cve/CVE-2021-21155" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Tab Strip in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21155/">CVE-2021-21155</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21156</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21157</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21157" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFEMB66XHIEXP6VOOQ4JIXBD6U5X4EIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Web Sockets in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157</cve>
	<bugzilla href="https://bugzilla.suse.com/1182358">SUSE bug 1182358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613695" comment="opera-74.0.3911.203-lp152.2.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624179" comment="libQt5Pdf5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624189" comment="libQt5Pdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624180" comment="libQt5PdfWidgets5-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624190" comment="libQt5PdfWidgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624181" comment="libqt5-qtpdf-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624191" comment="libqt5-qtpdf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624182" comment="libqt5-qtpdf-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624192" comment="libqt5-qtpdf-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624183" comment="libqt5-qtpdf-imports-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624193" comment="libqt5-qtpdf-imports is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624184" comment="libqt5-qtpdf-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624194" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624185" comment="libqt5-qtwebengine-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624186" comment="libqt5-qtwebengine-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624187" comment="libqt5-qtwebengine-examples-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624188" comment="libqt5-qtwebengine-private-headers-devel-5.15.3-lp152.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21159</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21159" ref_url="https://www.suse.com/security/cve/CVE-2021-21159" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21159/">CVE-2021-21159</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21160</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21160" ref_url="https://www.suse.com/security/cve/CVE-2021-21160" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebAudio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21160/">CVE-2021-21160</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21161</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21161" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21161" ref_url="https://www.suse.com/security/cve/CVE-2021-21161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21161/">CVE-2021-21161</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21162</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21162" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21162" ref_url="https://www.suse.com/security/cve/CVE-2021-21162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21162/">CVE-2021-21162</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21163</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21163" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21163" ref_url="https://www.suse.com/security/cve/CVE-2021-21163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21163/">CVE-2021-21163</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21164" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21164" ref_url="https://www.suse.com/security/cve/CVE-2021-21164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Chrome on iOS in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21164/">CVE-2021-21164</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21165</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21165" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21165" ref_url="https://www.suse.com/security/cve/CVE-2021-21165" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21165/">CVE-2021-21165</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21166" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21166" ref_url="https://www.suse.com/security/cve/CVE-2021-21166" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21166/">CVE-2021-21166</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21167" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21167" ref_url="https://www.suse.com/security/cve/CVE-2021-21167" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21167/">CVE-2021-21167</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21168</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21168" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21168" ref_url="https://www.suse.com/security/cve/CVE-2021-21168" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in appcache in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21168/">CVE-2021-21168</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21169</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21169" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21169" ref_url="https://www.suse.com/security/cve/CVE-2021-21169" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in V8 in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21169/">CVE-2021-21169</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21170</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21170" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21170" ref_url="https://www.suse.com/security/cve/CVE-2021-21170" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Loader in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21170/">CVE-2021-21170</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21171</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21171" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21171" ref_url="https://www.suse.com/security/cve/CVE-2021-21171" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in TabStrip and Navigation in Google Chrome on Android prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21171/">CVE-2021-21171</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21172</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21172" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21172" ref_url="https://www.suse.com/security/cve/CVE-2021-21172" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21172/">CVE-2021-21172</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21173</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21173" ref_url="https://www.suse.com/security/cve/CVE-2021-21173" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in Network Internals in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21173/">CVE-2021-21173</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21174</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21174" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21174" ref_url="https://www.suse.com/security/cve/CVE-2021-21174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Referrer in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21174/">CVE-2021-21174</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21175</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21175" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21175" ref_url="https://www.suse.com/security/cve/CVE-2021-21175" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Site isolation in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21175/">CVE-2021-21175</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21176</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21176" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21176" ref_url="https://www.suse.com/security/cve/CVE-2021-21176" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in full screen mode in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21176/">CVE-2021-21176</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21177" ref_url="https://www.suse.com/security/cve/CVE-2021-21177" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21177/">CVE-2021-21177</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21178</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21178" ref_url="https://www.suse.com/security/cve/CVE-2021-21178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21178/">CVE-2021-21178</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21179</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21179" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21179" ref_url="https://www.suse.com/security/cve/CVE-2021-21179" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Use after free in Network Internals in Google Chrome on Linux prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21179/">CVE-2021-21179</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21180" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21180" ref_url="https://www.suse.com/security/cve/CVE-2021-21180" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21180/">CVE-2021-21180</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21181</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21181" ref_url="https://www.suse.com/security/cve/CVE-2021-21181" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21181/">CVE-2021-21181</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21182</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21182" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21182" ref_url="https://www.suse.com/security/cve/CVE-2021-21182" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21182/">CVE-2021-21182</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21183</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21183" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21183" ref_url="https://www.suse.com/security/cve/CVE-2021-21183" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21183/">CVE-2021-21183</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21184</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21184" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21184" ref_url="https://www.suse.com/security/cve/CVE-2021-21184" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21184/">CVE-2021-21184</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21185" ref_url="https://www.suse.com/security/cve/CVE-2021-21185" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 89.0.4389.72 allowed an attacker who convinced a user to install a malicious extension to obtain sensitive information via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21185/">CVE-2021-21185</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21186</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21186" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21186" ref_url="https://www.suse.com/security/cve/CVE-2021-21186" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in QR scanning in Google Chrome on iOS prior to 89.0.4389.72 allowed an attacker who convinced the user to scan a QR code to bypass navigation restrictions via a crafted QR code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21186/">CVE-2021-21186</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21187</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21187" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21187" ref_url="https://www.suse.com/security/cve/CVE-2021-21187" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in URL formatting in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21187/">CVE-2021-21187</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21188</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21188" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21188" ref_url="https://www.suse.com/security/cve/CVE-2021-21188" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21188/">CVE-2021-21188</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21189</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21189" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21189" ref_url="https://www.suse.com/security/cve/CVE-2021-21189" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in payments in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21189/">CVE-2021-21189</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21190</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21190" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21190" ref_url="https://www.suse.com/security/cve/CVE-2021-21190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21190/">CVE-2021-21190</cve>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613614" comment="chromedriver-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613615" comment="chromium-89.0.4389.72-lp152.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21191</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21191" ref_url="https://www.suse.com/security/cve/CVE-2021-21191" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJEA6IOQ2CJDQ5EOOYOTAMEHN6772YOW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YWKF4CBSQUAW5TXSAKSJ2IWL4TE2FP6H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21191/">CVE-2021-21191</cve>
	<bugzilla href="https://bugzilla.suse.com/1183515">SUSE bug 1183515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613793" comment="chromedriver-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613794" comment="chromium-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21192</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21192" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21192" ref_url="https://www.suse.com/security/cve/CVE-2021-21192" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJEA6IOQ2CJDQ5EOOYOTAMEHN6772YOW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YWKF4CBSQUAW5TXSAKSJ2IWL4TE2FP6H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in tab groups in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21192/">CVE-2021-21192</cve>
	<bugzilla href="https://bugzilla.suse.com/1183515">SUSE bug 1183515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613793" comment="chromedriver-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613794" comment="chromium-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21193" ref_url="https://www.suse.com/security/cve/CVE-2021-21193" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJEA6IOQ2CJDQ5EOOYOTAMEHN6772YOW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YWKF4CBSQUAW5TXSAKSJ2IWL4TE2FP6H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21193/">CVE-2021-21193</cve>
	<bugzilla href="https://bugzilla.suse.com/1183515">SUSE bug 1183515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613793" comment="chromedriver-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613794" comment="chromium-89.0.4389.90-lp152.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21194</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21194" ref_url="https://www.suse.com/security/cve/CVE-2021-21194" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21194/">CVE-2021-21194</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21195</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21195" ref_url="https://www.suse.com/security/cve/CVE-2021-21195" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21195/">CVE-2021-21195</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21196" ref_url="https://www.suse.com/security/cve/CVE-2021-21196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21196/">CVE-2021-21196</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21197" ref_url="https://www.suse.com/security/cve/CVE-2021-21197" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21197/">CVE-2021-21197</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21198</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21198" ref_url="https://www.suse.com/security/cve/CVE-2021-21198" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21198/">CVE-2021-21198</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21199</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21199" ref_url="https://www.suse.com/security/cve/CVE-2021-21199" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB2VUPDDX4YJQ53XSCKQEHEHQMCW2MOQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/REVRJBO5263D3WBYK2JYYJCS6EALUV7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RDJ7VXQ4XSRZDWGET7L5VU52AB3SLWM/" source="SUSE-SU"/>
    <description>
    Use after free in Aura in Google Chrome on Linux prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21199/">CVE-2021-21199</cve>
	<bugzilla href="https://bugzilla.suse.com/1184256">SUSE bug 1184256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614226" comment="opera-75.0.3969.171-lp152.2.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613964" comment="chromedriver-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613965" comment="chromium-89.0.4389.114-lp152.2.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21201" ref_url="https://www.suse.com/security/cve/CVE-2021-21201" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in permissions in Google Chrome prior to 90.0.4430.72 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21201/">CVE-2021-21201</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21202</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21202" ref_url="https://www.suse.com/security/cve/CVE-2021-21202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21202/">CVE-2021-21202</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21203" ref_url="https://www.suse.com/security/cve/CVE-2021-21203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21203/">CVE-2021-21203</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21204" ref_url="https://www.suse.com/security/cve/CVE-2021-21204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21204/">CVE-2021-21204</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21205</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21205" ref_url="https://www.suse.com/security/cve/CVE-2021-21205" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21205/">CVE-2021-21205</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21206</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21206" ref_url="https://www.suse.com/security/cve/CVE-2021-21206" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J4EIEBQDVS2O3BUI7IGNQ45JQRY7IQ5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IO7QUUW232VPDW2BITKAFAZ63OJKMQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-21206/">CVE-2021-21206</cve>
	<bugzilla href="https://bugzilla.suse.com/1184700">SUSE bug 1184700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614182" comment="chromedriver-89.0.4389.128-lp152.2.86.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614183" comment="chromium-89.0.4389.128-lp152.2.86.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21207" ref_url="https://www.suse.com/security/cve/CVE-2021-21207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21207/">CVE-2021-21207</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21208" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21208" ref_url="https://www.suse.com/security/cve/CVE-2021-21208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in QR scanner in Google Chrome on iOS prior to 90.0.4430.72 allowed an attacker displaying a QR code to perform domain spoofing via a crafted QR code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21208/">CVE-2021-21208</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21209</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21209" ref_url="https://www.suse.com/security/cve/CVE-2021-21209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in storage in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21209/">CVE-2021-21209</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21210</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21210" ref_url="https://www.suse.com/security/cve/CVE-2021-21210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Network in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially access local UDP ports via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21210/">CVE-2021-21210</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21211</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21211" ref_url="https://www.suse.com/security/cve/CVE-2021-21211" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21211/">CVE-2021-21211</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21212</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21212" ref_url="https://www.suse.com/security/cve/CVE-2021-21212" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Network Config UI in Google Chrome on ChromeOS prior to 90.0.4430.72 allowed a remote attacker to potentially compromise WiFi connection security via a malicious WAP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21212/">CVE-2021-21212</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21213</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21213" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21213" ref_url="https://www.suse.com/security/cve/CVE-2021-21213" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Use after free in WebMIDI in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21213/">CVE-2021-21213</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21220" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21220" ref_url="https://www.suse.com/security/cve/CVE-2021-21220" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J4EIEBQDVS2O3BUI7IGNQ45JQRY7IQ5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IO7QUUW232VPDW2BITKAFAZ63OJKMQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-21220/">CVE-2021-21220</cve>
	<bugzilla href="https://bugzilla.suse.com/1184700">SUSE bug 1184700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614182" comment="chromedriver-89.0.4389.128-lp152.2.86.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614183" comment="chromium-89.0.4389.128-lp152.2.86.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21221" ref_url="https://www.suse.com/security/cve/CVE-2021-21221" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Mojo in Google Chrome prior to 90.0.4430.72 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21221/">CVE-2021-21221</cve>
	<bugzilla href="https://bugzilla.suse.com/1184764">SUSE bug 1184764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21222" ref_url="https://www.suse.com/security/cve/CVE-2021-21222" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21222/">CVE-2021-21222</cve>
	<bugzilla href="https://bugzilla.suse.com/1185047">SUSE bug 1185047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21223</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21223" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21223" ref_url="https://www.suse.com/security/cve/CVE-2021-21223" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21223/">CVE-2021-21223</cve>
	<bugzilla href="https://bugzilla.suse.com/1185047">SUSE bug 1185047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21224</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21224" ref_url="https://www.suse.com/security/cve/CVE-2021-21224" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21224/">CVE-2021-21224</cve>
	<bugzilla href="https://bugzilla.suse.com/1185047">SUSE bug 1185047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21225" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21225" ref_url="https://www.suse.com/security/cve/CVE-2021-21225" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21225/">CVE-2021-21225</cve>
	<bugzilla href="https://bugzilla.suse.com/1185047">SUSE bug 1185047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21226</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21226" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21226" ref_url="https://www.suse.com/security/cve/CVE-2021-21226" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVVTKODULIJ72SWD273BSN4VWATWGOOD/" source="SUSE-SU"/>
    <description>
    Use after free in navigation in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21226/">CVE-2021-21226</cve>
	<bugzilla href="https://bugzilla.suse.com/1185047">SUSE bug 1185047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614618" comment="opera-76.0.4017.94-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21227</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21227" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21227" ref_url="https://www.suse.com/security/cve/CVE-2021-21227" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21227/">CVE-2021-21227</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21228" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21228" ref_url="https://www.suse.com/security/cve/CVE-2021-21228" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 90.0.4430.93 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21228/">CVE-2021-21228</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21229" ref_url="https://www.suse.com/security/cve/CVE-2021-21229" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in downloads in Google Chrome on Android prior to 90.0.4430.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21229/">CVE-2021-21229</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21230</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21230" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21230" ref_url="https://www.suse.com/security/cve/CVE-2021-21230" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21230/">CVE-2021-21230</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21231" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21231" ref_url="https://www.suse.com/security/cve/CVE-2021-21231" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21231/">CVE-2021-21231</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21232" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21232" ref_url="https://www.suse.com/security/cve/CVE-2021-21232" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21232/">CVE-2021-21232</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21233" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21233" ref_url="https://www.suse.com/security/cve/CVE-2021-21233" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBOWNTMQCMDYBSMTERFTO5ZSZSUCY7QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJBSCHMF25QDPD6LPM3ZPBBNJZQLF7VX/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21233/">CVE-2021-21233</cve>
	<bugzilla href="https://bugzilla.suse.com/1185375">SUSE bug 1185375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614667" comment="opera-76.0.4017.107-lp152.2.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614320" comment="chromedriver-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614321" comment="chromium-90.0.4430.93-lp152.2.89.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21240</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANZIEBB4AJVGYC2KYDE7RDSTFBBTL5ID/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
    <description>
    httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614743" comment="python2-httplib2-0.19.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475569" comment="python2-httplib2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614744" comment="python3-httplib2-0.19.0-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475570" comment="python3-httplib2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21261</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JRX7C3J3TJQXJODJCARSGDYY4AM57Q7/" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261</cve>
	<bugzilla href="https://bugzilla.suse.com/1180996">SUSE bug 1180996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613976" comment="flatpak-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171006" comment="flatpak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613977" comment="flatpak-devel-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171008" comment="flatpak-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613978" comment="flatpak-zsh-completion-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350833" comment="flatpak-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613979" comment="libflatpak0-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171009" comment="libflatpak0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613980" comment="libostree-2020.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350834" comment="libostree is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613981" comment="libostree-1-1-2020.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350835" comment="libostree-1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613982" comment="libostree-devel-2020.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350836" comment="libostree-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613983" comment="libostree-grub2-2020.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350837" comment="libostree-grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613984" comment="system-user-flatpak-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350838" comment="system-user-flatpak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613985" comment="typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171010" comment="typelib-1_0-Flatpak-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613986" comment="typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350839" comment="typelib-1_0-OSTree-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613987" comment="xdg-desktop-portal-1.8.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350840" comment="xdg-desktop-portal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613988" comment="xdg-desktop-portal-devel-1.8.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350841" comment="xdg-desktop-portal-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613989" comment="xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350842" comment="xdg-desktop-portal-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613990" comment="xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350843" comment="xdg-desktop-portal-gtk-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613991" comment="xdg-desktop-portal-lang-1.8.0-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350844" comment="xdg-desktop-portal-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/&lt;remapping&gt;" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284</cve>
	<bugzilla href="https://bugzilla.suse.com/1181732">SUSE bug 1181732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615073" comment="containerd-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615074" comment="containerd-ctr-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615075" comment="docker-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615076" comment="docker-bash-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615077" comment="docker-fish-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613144" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613145" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613146" comment="docker-test-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615078" comment="docker-zsh-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613148" comment="fish-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343481" comment="fish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613149" comment="fish-devel-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343482" comment="fish-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613150" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615079" comment="runc-1.0.0~rc93-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21285" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285</cve>
	<bugzilla href="https://bugzilla.suse.com/1181730">SUSE bug 1181730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615073" comment="containerd-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615074" comment="containerd-ctr-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615075" comment="docker-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615076" comment="docker-bash-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615077" comment="docker-fish-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613144" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613145" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613146" comment="docker-test-19.03.15_ce-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615078" comment="docker-zsh-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613148" comment="fish-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343481" comment="fish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613149" comment="fish-devel-2.7.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343482" comment="fish-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613150" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615079" comment="runc-1.0.0~rc93-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2129" ref_url="https://www.suse.com/security/cve/CVE-2021-2129" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOZDUDAVWBPMEHQXT2I4NXOMGVCWB5BM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RTNW7ZRCP2VD6YMPAHFC7MY4YIB5GTL/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2129/">CVE-2021-2129</cve>
	<bugzilla href="https://bugzilla.suse.com/1181198">SUSE bug 1181198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181199">SUSE bug 1181199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614322" comment="python3-virtualbox-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614323" comment="virtualbox-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614324" comment="virtualbox-devel-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614325" comment="virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614326" comment="virtualbox-guest-source-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614327" comment="virtualbox-guest-tools-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614328" comment="virtualbox-guest-x11-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614329" comment="virtualbox-host-source-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614330" comment="virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614331" comment="virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614332" comment="virtualbox-qt-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614333" comment="virtualbox-vnc-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614334" comment="virtualbox-websrv-6.1.20-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21295" ref_url="https://www.suse.com/security/cve/CVE-2021-21295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XDF63Q7PJ5ZO6J24Z3YJ7WWZWTTROVC2/" source="SUSE-SU"/>
    <description>
    Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers &amp; clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21295/">CVE-2021-21295</cve>
	<bugzilla href="https://bugzilla.suse.com/1183262">SUSE bug 1183262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184203">SUSE bug 1184203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613803" comment="netty-4.1.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347974" comment="netty is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613804" comment="netty-javadoc-4.1.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347975" comment="netty-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613805" comment="netty-poms-4.1.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347976" comment="netty-poms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21300</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33ZBSRS6RUAL5LAGWR6DDONQJXFU6FIT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNQQ262LF4R2GIO7S7J6NRAUDKV7VGPB/" source="SUSE-SU"/>
    <description>
    Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613639" comment="git-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613640" comment="git-arch-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613641" comment="git-core-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613642" comment="git-credential-gnome-keyring-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613643" comment="git-credential-libsecret-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613644" comment="git-cvs-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613645" comment="git-daemon-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613646" comment="git-doc-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613647" comment="git-email-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613648" comment="git-gui-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613649" comment="git-p4-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613650" comment="git-svn-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613651" comment="git-web-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613652" comment="gitk-2.26.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21309" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21309" ref_url="https://www.suse.com/security/cve/CVE-2021-21309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z32YY6DUIFNGIYRC6JPVBZ2WTPYN5SOY/" source="SUSE-SU"/>
    <description>
    Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. We believe this could in certain conditions be exploited for remote code execution. By default, authenticated Redis users have access to all configuration parameters and can therefore use the “CONFIG SET proto-max-bulk-len” to change the safe default, making the system vulnerable. **This problem only affects 32-bit Redis (on a 32-bit system, or as a 32-bit executable running on a 64-bit system).** The problem is fixed in version 6.2, and the fix is back ported to 6.0.11 and 5.0.11. Make sure you use one of these versions if you are running 32-bit Redis. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent clients from directly executing `CONFIG SET`: Using Redis 6.0 or newer, ACL configuration can be used to block the command. Using older versions, the `rename-command` configuration directive can be used to rename the command to a random string unknown to users, rendering it inaccessible. Please note that this workaround may have an additional impact on users or operational systems that expect `CONFIG SET` to behave in certain ways.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21309/">CVE-2021-21309</cve>
	<bugzilla href="https://bugzilla.suse.com/1182657">SUSE bug 1182657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614564" comment="redis-6.0.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21334</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21334" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="TID000020328" ref_url="https://www.suse.com/support/kb/doc/?id=000020328" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334</cve>
	<bugzilla href="https://bugzilla.suse.com/1183397">SUSE bug 1183397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615073" comment="containerd-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615074" comment="containerd-ctr-1.4.4-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615075" comment="docker-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615076" comment="docker-bash-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615077" comment="docker-fish-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615078" comment="docker-zsh-completion-20.10.6_ce-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615079" comment="runc-1.0.0~rc93-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21341</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21341" ref_url="https://www.suse.com/security/cve/CVE-2021-21341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21341/">CVE-2021-21341</cve>
	<bugzilla href="https://bugzilla.suse.com/1184377">SUSE bug 1184377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21342</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21342" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21342" ref_url="https://www.suse.com/security/cve/CVE-2021-21342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21342/">CVE-2021-21342</cve>
	<bugzilla href="https://bugzilla.suse.com/1184379">SUSE bug 1184379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21343</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21343" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21343" ref_url="https://www.suse.com/security/cve/CVE-2021-21343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21343/">CVE-2021-21343</cve>
	<bugzilla href="https://bugzilla.suse.com/1184376">SUSE bug 1184376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21344</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21344" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344</cve>
	<bugzilla href="https://bugzilla.suse.com/1184375">SUSE bug 1184375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21345</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345</cve>
	<bugzilla href="https://bugzilla.suse.com/1184372">SUSE bug 1184372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21346</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21346" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346</cve>
	<bugzilla href="https://bugzilla.suse.com/1184373">SUSE bug 1184373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347</cve>
	<bugzilla href="https://bugzilla.suse.com/1184378">SUSE bug 1184378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21348" ref_url="https://www.suse.com/security/cve/CVE-2021-21348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21348/">CVE-2021-21348</cve>
	<bugzilla href="https://bugzilla.suse.com/1184374">SUSE bug 1184374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21349</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21349" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21349" ref_url="https://www.suse.com/security/cve/CVE-2021-21349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21349/">CVE-2021-21349</cve>
	<bugzilla href="https://bugzilla.suse.com/1184797">SUSE bug 1184797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21350" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350</cve>
	<bugzilla href="https://bugzilla.suse.com/1184380">SUSE bug 1184380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21351" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21351" ref_url="https://www.suse.com/security/cve/CVE-2021-21351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21351/">CVE-2021-21351</cve>
	<bugzilla href="https://bugzilla.suse.com/1184796">SUSE bug 1184796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614938" comment="xstream-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614939" comment="xstream-benchmark-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614940" comment="xstream-javadoc-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614941" comment="xstream-parent-1.4.16-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21372</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21372" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21372" ref_url="https://www.suse.com/security/cve/CVE-2021-21372" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NV5NCUH7W5BZXNXEYHHUQGISDZUK64IU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KP4YJ5PY3MI63TQDVZA6BQHCQPAXBGB/" source="SUSE-SU"/>
    <description>
    Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21372/">CVE-2021-21372</cve>
	<bugzilla href="https://bugzilla.suse.com/1185083">SUSE bug 1185083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614308" comment="nim-1.2.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351816" comment="nim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21373</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21373" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21373" ref_url="https://www.suse.com/security/cve/CVE-2021-21373" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NV5NCUH7W5BZXNXEYHHUQGISDZUK64IU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KP4YJ5PY3MI63TQDVZA6BQHCQPAXBGB/" source="SUSE-SU"/>
    <description>
    Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21373/">CVE-2021-21373</cve>
	<bugzilla href="https://bugzilla.suse.com/1185084">SUSE bug 1185084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614308" comment="nim-1.2.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351816" comment="nim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21374" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21374" ref_url="https://www.suse.com/security/cve/CVE-2021-21374" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NV5NCUH7W5BZXNXEYHHUQGISDZUK64IU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KP4YJ5PY3MI63TQDVZA6BQHCQPAXBGB/" source="SUSE-SU"/>
    <description>
    Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21374/">CVE-2021-21374</cve>
	<bugzilla href="https://bugzilla.suse.com/1185085">SUSE bug 1185085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614308" comment="nim-1.2.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351816" comment="nim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21404</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21404" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21404" ref_url="https://www.suse.com/security/cve/CVE-2021-21404" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0688-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIFNGMDOIZ3DQYLTSKXQFICFKTHWOLKM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVATCVHED4EFGAZ3YBJASSPIHZFG5AC7/" source="SUSE-SU"/>
    <description>
    Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash for the same reason if given a malformed message from a malicious relay server when attempting to join the relay. Relay joins are essentially random (from a subset of low latency relays) and Syncthing will by default restart when crashing, at which point it's likely to pick another non-malicious relay. This flaw is fixed in version 1.15.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21404/">CVE-2021-21404</cve>
	<bugzilla href="https://bugzilla.suse.com/1184428">SUSE bug 1184428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614568" comment="syncthing-1.15.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169708" comment="syncthing is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614569" comment="syncthing-relaysrv-1.15.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474282" comment="syncthing-relaysrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21416" ref_url="https://www.suse.com/security/cve/CVE-2021-21416" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2F72NF6ZBHDNQRLYZZFU7B52UQ4CZZRE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NL4XGVJ2AN5KEZDKGXRP3QKFGI24ETYA/" source="SUSE-SU"/>
    <description>
    django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires: A site is using django-registration &lt; 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account. Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-21416/">CVE-2021-21416</cve>
	<bugzilla href="https://bugzilla.suse.com/1184427">SUSE bug 1184427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614217" comment="python3-django-registration-3.1.2-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351450" comment="python3-django-registration is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2145" ref_url="https://www.suse.com/security/cve/CVE-2021-2145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2145/">CVE-2021-2145</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2161</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2161" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614644" comment="java-11-openjdk-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614645" comment="java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614646" comment="java-11-openjdk-demo-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614647" comment="java-11-openjdk-devel-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614648" comment="java-11-openjdk-headless-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614649" comment="java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614650" comment="java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614651" comment="java-11-openjdk-src-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631509" comment="java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631510" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631511" comment="java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631512" comment="java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631513" comment="java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631514" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631515" comment="java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2163</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NU2NP3UWZ4SXHVJIVENLSU4X5TAKTHL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UP4BA2GSD3EW2BMQV2VFVG2F3GMETZ5M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMIXIE2QCSQNEBZOFYWWIWYINHYQA6A5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNSY4TLUBETGRMX7GD6NXLOWEVJP6B4Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614644" comment="java-11-openjdk-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614645" comment="java-11-openjdk-accessibility-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614646" comment="java-11-openjdk-demo-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614647" comment="java-11-openjdk-devel-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614648" comment="java-11-openjdk-headless-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614649" comment="java-11-openjdk-javadoc-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614650" comment="java-11-openjdk-jmods-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614651" comment="java-11-openjdk-src-11.0.11.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615864" comment="java-1_8_0-openjdk-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615865" comment="java-1_8_0-openjdk-accessibility-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615866" comment="java-1_8_0-openjdk-demo-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615867" comment="java-1_8_0-openjdk-devel-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615868" comment="java-1_8_0-openjdk-headless-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615869" comment="java-1_8_0-openjdk-javadoc-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615870" comment="java-1_8_0-openjdk-src-1.8.0.292-lp152.2.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21702</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/657MMLMT2VMDWZEGPTHXVDBDN5UVZV2Y/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613193" comment="apache2-mod_php7-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613194" comment="php7-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613195" comment="php7-bcmath-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613196" comment="php7-bz2-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613197" comment="php7-calendar-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613198" comment="php7-ctype-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613199" comment="php7-curl-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613200" comment="php7-dba-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613201" comment="php7-devel-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613202" comment="php7-dom-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613203" comment="php7-embed-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613204" comment="php7-enchant-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613205" comment="php7-exif-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613206" comment="php7-fastcgi-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613207" comment="php7-fileinfo-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613208" comment="php7-firebird-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613209" comment="php7-fpm-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613210" comment="php7-ftp-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613211" comment="php7-gd-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613212" comment="php7-gettext-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613213" comment="php7-gmp-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613214" comment="php7-iconv-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613215" comment="php7-intl-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613216" comment="php7-json-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613217" comment="php7-ldap-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613218" comment="php7-mbstring-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613219" comment="php7-mysql-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613220" comment="php7-odbc-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613221" comment="php7-opcache-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613222" comment="php7-openssl-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613223" comment="php7-pcntl-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613224" comment="php7-pdo-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613225" comment="php7-pgsql-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613226" comment="php7-phar-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613227" comment="php7-posix-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613228" comment="php7-readline-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613229" comment="php7-shmop-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613230" comment="php7-snmp-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613231" comment="php7-soap-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613232" comment="php7-sockets-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613233" comment="php7-sodium-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613234" comment="php7-sqlite-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613235" comment="php7-sysvmsg-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613236" comment="php7-sysvsem-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613237" comment="php7-sysvshm-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613238" comment="php7-test-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613239" comment="php7-tidy-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613240" comment="php7-tokenizer-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613241" comment="php7-xmlreader-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613242" comment="php7-xmlrpc-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613243" comment="php7-xmlwriter-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613244" comment="php7-xsl-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613245" comment="php7-zip-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613246" comment="php7-zlib-7.4.6-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQSJP4Z6SALIQMUAEV267NSJB6EATBOB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5SCXUGIHHCMMDJ4KQPRDMJZB4DQFEII/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O33XW3SB7IZV5RQWCSZCBFQE4OBWACOB/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703</cve>
	<bugzilla href="https://bugzilla.suse.com/1192050">SUSE bug 1192050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659522" comment="apache2-mod_php7-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659523" comment="php7-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659524" comment="php7-bcmath-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659525" comment="php7-bz2-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659526" comment="php7-calendar-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659527" comment="php7-ctype-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659528" comment="php7-curl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659529" comment="php7-dba-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659530" comment="php7-devel-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659531" comment="php7-dom-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659532" comment="php7-embed-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659533" comment="php7-enchant-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659534" comment="php7-exif-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659535" comment="php7-fastcgi-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659536" comment="php7-fileinfo-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659537" comment="php7-firebird-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659538" comment="php7-fpm-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659539" comment="php7-ftp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659540" comment="php7-gd-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659541" comment="php7-gettext-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659542" comment="php7-gmp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659543" comment="php7-iconv-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659544" comment="php7-intl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659545" comment="php7-json-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659546" comment="php7-ldap-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659547" comment="php7-mbstring-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659548" comment="php7-mysql-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659549" comment="php7-odbc-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659550" comment="php7-opcache-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659551" comment="php7-openssl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659552" comment="php7-pcntl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659553" comment="php7-pdo-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659554" comment="php7-pgsql-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659555" comment="php7-phar-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659556" comment="php7-posix-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659557" comment="php7-readline-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659558" comment="php7-shmop-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659559" comment="php7-snmp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659560" comment="php7-soap-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659561" comment="php7-sockets-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659562" comment="php7-sodium-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659563" comment="php7-sqlite-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659564" comment="php7-sysvmsg-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659565" comment="php7-sysvsem-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659566" comment="php7-sysvshm-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659567" comment="php7-test-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659568" comment="php7-tidy-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659569" comment="php7-tokenizer-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659570" comment="php7-xmlreader-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659571" comment="php7-xmlrpc-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659572" comment="php7-xmlwriter-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659573" comment="php7-xsl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659574" comment="php7-zip-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659575" comment="php7-zlib-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21704" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BO2ME666CUOF6FDZXIKM27VW5MN7US3U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZBQEBPTH6UB3CIJQN5DS5XY65QU7M6A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2795-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OI533FKAZPJKSHOKRDDHYZBMHCKP25U/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<bugzilla href="https://bugzilla.suse.com/1188035">SUSE bug 1188035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630468" comment="apache2-mod_php7-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630469" comment="php7-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630470" comment="php7-bcmath-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630471" comment="php7-bz2-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630472" comment="php7-calendar-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630473" comment="php7-ctype-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630474" comment="php7-curl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630475" comment="php7-dba-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630476" comment="php7-devel-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630477" comment="php7-dom-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630478" comment="php7-embed-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630479" comment="php7-enchant-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630480" comment="php7-exif-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630481" comment="php7-fastcgi-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630482" comment="php7-fileinfo-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630483" comment="php7-firebird-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630484" comment="php7-fpm-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630485" comment="php7-ftp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630486" comment="php7-gd-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630487" comment="php7-gettext-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630488" comment="php7-gmp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630489" comment="php7-iconv-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630490" comment="php7-intl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630491" comment="php7-json-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630492" comment="php7-ldap-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630493" comment="php7-mbstring-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630494" comment="php7-mysql-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630495" comment="php7-odbc-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630496" comment="php7-opcache-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630497" comment="php7-openssl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630498" comment="php7-pcntl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630499" comment="php7-pdo-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630500" comment="php7-pgsql-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630501" comment="php7-phar-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630502" comment="php7-posix-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630503" comment="php7-readline-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630504" comment="php7-shmop-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630505" comment="php7-snmp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630506" comment="php7-soap-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630507" comment="php7-sockets-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630508" comment="php7-sodium-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630509" comment="php7-sqlite-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630510" comment="php7-sysvmsg-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630511" comment="php7-sysvsem-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630512" comment="php7-sysvshm-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630513" comment="php7-test-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630514" comment="php7-tidy-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630515" comment="php7-tokenizer-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630516" comment="php7-xmlreader-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630517" comment="php7-xmlrpc-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630518" comment="php7-xmlwriter-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630519" comment="php7-xsl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630520" comment="php7-zip-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630521" comment="php7-zlib-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BO2ME666CUOF6FDZXIKM27VW5MN7US3U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MUHKED3PFGNJNQGTSDBJO4XYJVLOTNO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZBQEBPTH6UB3CIJQN5DS5XY65QU7M6A/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630468" comment="apache2-mod_php7-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630469" comment="php7-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630470" comment="php7-bcmath-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630471" comment="php7-bz2-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630472" comment="php7-calendar-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630473" comment="php7-ctype-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630474" comment="php7-curl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630475" comment="php7-dba-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630476" comment="php7-devel-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630477" comment="php7-dom-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630478" comment="php7-embed-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630479" comment="php7-enchant-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630480" comment="php7-exif-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630481" comment="php7-fastcgi-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630482" comment="php7-fileinfo-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630483" comment="php7-firebird-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630484" comment="php7-fpm-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630485" comment="php7-ftp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630486" comment="php7-gd-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630487" comment="php7-gettext-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630488" comment="php7-gmp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630489" comment="php7-iconv-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630490" comment="php7-intl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630491" comment="php7-json-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630492" comment="php7-ldap-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630493" comment="php7-mbstring-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630494" comment="php7-mysql-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630495" comment="php7-odbc-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630496" comment="php7-opcache-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630497" comment="php7-openssl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630498" comment="php7-pcntl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630499" comment="php7-pdo-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630500" comment="php7-pgsql-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630501" comment="php7-phar-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630502" comment="php7-posix-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630503" comment="php7-readline-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630504" comment="php7-shmop-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630505" comment="php7-snmp-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630506" comment="php7-soap-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630507" comment="php7-sockets-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630508" comment="php7-sodium-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630509" comment="php7-sqlite-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630510" comment="php7-sysvmsg-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630511" comment="php7-sysvsem-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630512" comment="php7-sysvshm-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630513" comment="php7-test-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630514" comment="php7-tidy-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630515" comment="php7-tokenizer-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630516" comment="php7-xmlreader-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630517" comment="php7-xmlrpc-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630518" comment="php7-xmlwriter-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630519" comment="php7-xsl-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630520" comment="php7-zip-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630521" comment="php7-zlib-7.4.6-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQSJP4Z6SALIQMUAEV267NSJB6EATBOB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5SCXUGIHHCMMDJ4KQPRDMJZB4DQFEII/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O33XW3SB7IZV5RQWCSZCBFQE4OBWACOB/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659522" comment="apache2-mod_php7-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659523" comment="php7-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659524" comment="php7-bcmath-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659525" comment="php7-bz2-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659526" comment="php7-calendar-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659527" comment="php7-ctype-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659528" comment="php7-curl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659529" comment="php7-dba-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659530" comment="php7-devel-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659531" comment="php7-dom-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659532" comment="php7-embed-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659533" comment="php7-enchant-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659534" comment="php7-exif-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659535" comment="php7-fastcgi-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659536" comment="php7-fileinfo-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659537" comment="php7-firebird-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659538" comment="php7-fpm-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659539" comment="php7-ftp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659540" comment="php7-gd-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659541" comment="php7-gettext-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659542" comment="php7-gmp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659543" comment="php7-iconv-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659544" comment="php7-intl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659545" comment="php7-json-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659546" comment="php7-ldap-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659547" comment="php7-mbstring-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659548" comment="php7-mysql-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659549" comment="php7-odbc-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659550" comment="php7-opcache-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659551" comment="php7-openssl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659552" comment="php7-pcntl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659553" comment="php7-pdo-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659554" comment="php7-pgsql-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659555" comment="php7-phar-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659556" comment="php7-posix-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659557" comment="php7-readline-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659558" comment="php7-shmop-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659559" comment="php7-snmp-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659560" comment="php7-soap-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659561" comment="php7-sockets-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659562" comment="php7-sodium-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659563" comment="php7-sqlite-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659564" comment="php7-sysvmsg-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659565" comment="php7-sysvsem-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659566" comment="php7-sysvshm-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659567" comment="php7-test-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659568" comment="php7-tidy-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659569" comment="php7-tokenizer-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659570" comment="php7-xmlreader-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659571" comment="php7-xmlrpc-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659572" comment="php7-xmlwriter-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659573" comment="php7-xsl-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659574" comment="php7-zip-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659575" comment="php7-zlib-7.4.6-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21775</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<bugzilla href="https://bugzilla.suse.com/1188293">SUSE bug 1188293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process’s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630527" comment="kernel-debug-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630528" comment="kernel-debug-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630529" comment="kernel-default-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630530" comment="kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630531" comment="kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630532" comment="kernel-default-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630533" comment="kernel-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630534" comment="kernel-docs-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630535" comment="kernel-docs-html-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630536" comment="kernel-kvmsmall-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630537" comment="kernel-kvmsmall-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630538" comment="kernel-macros-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630539" comment="kernel-obs-build-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630540" comment="kernel-obs-qa-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630541" comment="kernel-preempt-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630542" comment="kernel-preempt-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630543" comment="kernel-source-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630544" comment="kernel-source-vanilla-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630545" comment="kernel-syms-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<bugzilla href="https://bugzilla.suse.com/1188294">SUSE bug 1188294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652648" comment="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652649" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652650" comment="libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652651" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652652" comment="libwebkit2gtk3-lang-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652653" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652654" comment="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652655" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652656" comment="webkit-jsc-4-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652657" comment="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652658" comment="webkit2gtk3-devel-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652659" comment="webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21996</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21996" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YD2NL2DWHZHSXKKSMUAKRRR4DVAXJ6QS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7B4SF25YMDBZ6THNOFMFVVX33VAXGND/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653942" comment="python3-salt-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653943" comment="salt-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653944" comment="salt-api-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653945" comment="salt-bash-completion-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653946" comment="salt-cloud-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653947" comment="salt-doc-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653948" comment="salt-fish-completion-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653949" comment="salt-master-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653950" comment="salt-minion-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653951" comment="salt-proxy-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653952" comment="salt-ssh-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653953" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653954" comment="salt-syndic-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653955" comment="salt-transactional-update-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653956" comment="salt-zsh-completion-3002.2-lp152.3.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22116" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22116" ref_url="https://www.suse.com/security/cve/CVE-2021-22116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009557.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWIIK75CV5Y6TWUXN67IYXFNHIHRZSXN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/" source="SUSE-SU"/>
    <description>
    RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22116/">CVE-2021-22116</cve>
	<bugzilla href="https://bugzilla.suse.com/1186203">SUSE bug 1186203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651179" comment="erlang-rabbitmq-client-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154286" comment="erlang-rabbitmq-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651180" comment="rabbitmq-server-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154287" comment="rabbitmq-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651181" comment="rabbitmq-server-plugins-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154288" comment="rabbitmq-server-plugins is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22173</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173</cve>
	<bugzilla href="https://bugzilla.suse.com/1181598">SUSE bug 1181598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22174</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Crash in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174</cve>
	<bugzilla href="https://bugzilla.suse.com/1181599">SUSE bug 1181599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22191</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191</cve>
	<bugzilla href="https://bugzilla.suse.com/1183353">SUSE bug 1183353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22204" ref_url="https://www.suse.com/security/cve/CVE-2021-22204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLQ4XG6SNL6OL7SHPBZLVWYCAEZGZW5X/" source="SUSE-SU"/>
    <description>
    Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22204/">CVE-2021-22204</cve>
	<bugzilla href="https://bugzilla.suse.com/1185547">SUSE bug 1185547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615779" comment="exiftool-12.25-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474511" comment="exiftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615780" comment="perl-File-RandomAccess-12.25-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474513" comment="perl-File-RandomAccess is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615781" comment="perl-Image-ExifTool-12.25-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474515" comment="perl-Image-ExifTool is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207</cve>
	<bugzilla href="https://bugzilla.suse.com/1185128">SUSE bug 1185128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615166" comment="libwireshark14-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615167" comment="libwiretap11-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615168" comment="libwsutil12-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615169" comment="wireshark-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615170" comment="wireshark-devel-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615171" comment="wireshark-ui-qt-3.4.5-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22235</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXJUYMM2H4KU2VF6U5RA2U4CYRSDII7S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2S3TY7NTSCEXTNC5OYYNCRDTT7MRPXP7/" source="SUSE-SU"/>
    <description>
    Crash in DNP dissector in Wireshark 3.4.0 to 3.4.6 and 3.2.0 to 3.2.14 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235</cve>
	<bugzilla href="https://bugzilla.suse.com/1188375">SUSE bug 1188375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633122" comment="libwireshark14-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633123" comment="libwiretap11-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633124" comment="libwsutil12-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633125" comment="wireshark-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633126" comment="wireshark-devel-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633127" comment="wireshark-ui-qt-3.4.7-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2250</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2250" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2250" ref_url="https://www.suse.com/security/cve/CVE-2021-2250" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2250/">CVE-2021-2250</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630527" comment="kernel-debug-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630528" comment="kernel-debug-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630529" comment="kernel-default-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630530" comment="kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630531" comment="kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630532" comment="kernel-default-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630533" comment="kernel-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630534" comment="kernel-docs-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630535" comment="kernel-docs-html-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630536" comment="kernel-kvmsmall-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630537" comment="kernel-kvmsmall-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630538" comment="kernel-macros-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630539" comment="kernel-obs-build-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630540" comment="kernel-obs-qa-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630541" comment="kernel-preempt-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630542" comment="kernel-preempt-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630543" comment="kernel-source-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630544" comment="kernel-source-vanilla-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630545" comment="kernel-syms-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188411">SUSE bug 1188411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626319" comment="kernel-debug-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626320" comment="kernel-debug-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626321" comment="kernel-default-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626322" comment="kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626323" comment="kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626324" comment="kernel-default-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626325" comment="kernel-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626326" comment="kernel-docs-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626327" comment="kernel-docs-html-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626328" comment="kernel-kvmsmall-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626329" comment="kernel-kvmsmall-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626330" comment="kernel-macros-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626331" comment="kernel-obs-build-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626332" comment="kernel-obs-qa-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626333" comment="kernel-preempt-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626334" comment="kernel-preempt-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626335" comment="kernel-source-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626336" comment="kernel-source-vanilla-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626337" comment="kernel-syms-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2264</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2264" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2264" ref_url="https://www.suse.com/security/cve/CVE-2021-2264" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RTNW7ZRCP2VD6YMPAHFC7MY4YIB5GTL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 8.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2264/">CVE-2021-2264</cve>
	<bugzilla href="https://bugzilla.suse.com/1184542">SUSE bug 1184542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2266</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2266" ref_url="https://www.suse.com/security/cve/CVE-2021-2266" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2266/">CVE-2021-2266</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2279</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2279" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2279" ref_url="https://www.suse.com/security/cve/CVE-2021-2279" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows unauthenticated attacker with network access via RDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2279/">CVE-2021-2279</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2280</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2280" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2280" ref_url="https://www.suse.com/security/cve/CVE-2021-2280" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2280/">CVE-2021-2280</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2281</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2281" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2281" ref_url="https://www.suse.com/security/cve/CVE-2021-2281" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2281/">CVE-2021-2281</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2282</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2282" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2282" ref_url="https://www.suse.com/security/cve/CVE-2021-2282" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2282/">CVE-2021-2282</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2283" ref_url="https://www.suse.com/security/cve/CVE-2021-2283" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2283/">CVE-2021-2283</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2284" ref_url="https://www.suse.com/security/cve/CVE-2021-2284" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2284/">CVE-2021-2284</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2285" ref_url="https://www.suse.com/security/cve/CVE-2021-2285" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2285/">CVE-2021-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2286</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2286" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2286" ref_url="https://www.suse.com/security/cve/CVE-2021-2286" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2286/">CVE-2021-2286</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2287</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2287" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2287" ref_url="https://www.suse.com/security/cve/CVE-2021-2287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2287/">CVE-2021-2287</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22876</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HDAO4Q3JZASM6AK274RF74JN2GJOK5UE/" source="SUSE-SU"/>
    <description>
    curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613953" comment="curl-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613954" comment="curl-mini-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613955" comment="libcurl-devel-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613956" comment="libcurl-devel-32bit-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613957" comment="libcurl-mini-devel-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613958" comment="libcurl4-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613959" comment="libcurl4-32bit-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613960" comment="libcurl4-mini-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22879</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22879" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22879" ref_url="https://www.suse.com/security/cve/CVE-2021-22879" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YL7MF53UDFP75PXEIEPNXBAJQBN6ZIBB/" source="SUSE-SU"/>
    <description>
    Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22879/">CVE-2021-22879</cve>
	<bugzilla href="https://bugzilla.suse.com/1184770">SUSE bug 1184770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614184" comment="caja-extension-nextcloud-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351451" comment="caja-extension-nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614185" comment="libnextcloudsync-devel-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351452" comment="libnextcloudsync-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614186" comment="libnextcloudsync0-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351453" comment="libnextcloudsync0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614187" comment="nautilus-extension-nextcloud-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351454" comment="nautilus-extension-nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614188" comment="nemo-extension-nextcloud-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351455" comment="nemo-extension-nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614189" comment="nextcloud-desktop-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351456" comment="nextcloud-desktop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614190" comment="nextcloud-desktop-doc-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351457" comment="nextcloud-desktop-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614191" comment="nextcloud-desktop-dolphin-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351458" comment="nextcloud-desktop-dolphin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614192" comment="nextcloud-desktop-lang-3.1.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351459" comment="nextcloud-desktop-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22880</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22880" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RROJLD5MLZPMJEWUQBDZP3I6WJGCWMUE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSBBYVVTCKLFKYMF7OEIC2G2QUWN6ERM/" source="SUSE-SU"/>
    <description>
    The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880</cve>
	<bugzilla href="https://bugzilla.suse.com/1182169">SUSE bug 1182169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188335">SUSE bug 1188335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656151" comment="ruby2.5-rubygem-activerecord-5_1-5.1.4-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654661" comment="ruby2.5-rubygem-activerecord-5_1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22883</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IFAU2LY7VNOWXLRDXRBCJBCP2EQTMRFN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
    <description>
    Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883</cve>
	<bugzilla href="https://bugzilla.suse.com/1182619">SUSE bug 1182619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613506" comment="nodejs10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613507" comment="nodejs10-devel-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613508" comment="nodejs10-docs-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613422" comment="nodejs12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613423" comment="nodejs12-devel-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613424" comment="nodejs12-docs-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613418" comment="nodejs14-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613419" comment="nodejs14-devel-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613420" comment="nodejs14-docs-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613509" comment="npm10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613425" comment="npm12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613421" comment="npm14-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22884</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IFAU2LY7VNOWXLRDXRBCJBCP2EQTMRFN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIHWFR7WY377VQGZYACB2WYPTO2EOYVQ/" source="SUSE-SU"/>
    <description>
    Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613506" comment="nodejs10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613507" comment="nodejs10-devel-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613508" comment="nodejs10-docs-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613422" comment="nodejs12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613423" comment="nodejs12-devel-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613424" comment="nodejs12-docs-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613418" comment="nodejs14-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613419" comment="nodejs14-devel-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613420" comment="nodejs14-docs-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613605" comment="nodejs8-8.17.0-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613606" comment="nodejs8-devel-8.17.0-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613607" comment="nodejs8-docs-8.17.0-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613509" comment="npm10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613425" comment="npm12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613421" comment="npm14-14.16.0-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613608" comment="npm8-8.17.0-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22885</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHCB7JMW3HFGNRHZXPJUK7TS6FSJM2AA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XD33DNJH2JNZCIIOPYYFAACZRFEZSRKI/" source="SUSE-SU"/>
    <description>
    A possible information disclosure / unintended method execution vulnerability in Action Pack &gt;= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885</cve>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614772" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253149" comment="ruby2.5-rubygem-actionpack-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614773" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253150" comment="ruby2.5-rubygem-actionpack-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22890</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HDAO4Q3JZASM6AK274RF74JN2GJOK5UE/" source="SUSE-SU"/>
    <description>
    curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890</cve>
	<bugzilla href="https://bugzilla.suse.com/1183934">SUSE bug 1183934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613953" comment="curl-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613954" comment="curl-mini-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613955" comment="libcurl-devel-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613956" comment="libcurl-devel-32bit-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613957" comment="libcurl-mini-devel-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613958" comment="libcurl4-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613959" comment="libcurl4-32bit-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613960" comment="libcurl4-mini-7.66.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22898</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0808-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ES6AKURDGLC4PDCDFLHOPWYDQA55NHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBJDOC5P7XCTDSENHRNLNXYRSHFI4CYU/" source="SUSE-SU"/>
    <description>
    curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192450">SUSE bug 1192450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614793" comment="curl-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614794" comment="curl-mini-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614795" comment="libcurl-devel-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614796" comment="libcurl-devel-32bit-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614797" comment="libcurl-mini-devel-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614798" comment="libcurl4-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614799" comment="libcurl4-32bit-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614800" comment="libcurl4-mini-7.66.0-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2291</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2291" ref_url="https://www.suse.com/security/cve/CVE-2021-2291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2291/">CVE-2021-2291</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
    <description>
    Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625524" comment="nodejs14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625525" comment="nodejs14-devel-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625526" comment="nodejs14-docs-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625527" comment="npm14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626682" comment="curl-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626683" comment="curl-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626684" comment="libcurl-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626685" comment="libcurl-devel-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626686" comment="libcurl-mini-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626687" comment="libcurl4-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626688" comment="libcurl4-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626689" comment="libcurl4-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22923</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626682" comment="curl-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626683" comment="curl-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626684" comment="libcurl-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626685" comment="libcurl-devel-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626686" comment="libcurl-mini-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626687" comment="libcurl4-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626688" comment="libcurl4-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626689" comment="libcurl4-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626682" comment="curl-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626683" comment="curl-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626684" comment="libcurl-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626685" comment="libcurl-devel-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626686" comment="libcurl-mini-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626687" comment="libcurl4-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626688" comment="libcurl4-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626689" comment="libcurl4-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626682" comment="curl-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626683" comment="curl-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626684" comment="libcurl-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626685" comment="libcurl-devel-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626686" comment="libcurl-mini-devel-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626687" comment="libcurl4-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626688" comment="libcurl4-32bit-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626689" comment="libcurl4-mini-7.66.0-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22929</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22929" ref_url="https://www.suse.com/security/cve/CVE-2021-22929" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZELBVBNTOTNRG5IP3NQWA756AE37TH5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWMVF2ED2B62IU44X7PM242TCNDW2NG6/" source="SUSE-SU"/>
    <description>
    An information disclosure exists in Brave Browser Desktop prior to version 1.28.62, where logged warning messages that included timestamps of connections to V2 onion domains in tor.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-22929/">CVE-2021-22929</cve>
	<bugzilla href="https://bugzilla.suse.com/1192658">SUSE bug 1192658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658737" comment="tor-0.4.6.8-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22930</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTH54PEZGDIX6ARBBWVMMOYRGAQTP7DV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4WV4L3BNHGJFK3NT7YVDUR6UNHPAFSZC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632617" comment="nodejs10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632618" comment="nodejs10-devel-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632619" comment="nodejs10-docs-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632222" comment="nodejs12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632223" comment="nodejs12-devel-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632224" comment="nodejs12-docs-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634497" comment="nodejs14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634498" comment="nodejs14-devel-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634499" comment="nodejs14-docs-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651578" comment="nodejs8-8.17.0-lp152.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651579" comment="nodejs8-devel-8.17.0-lp152.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651580" comment="nodejs8-docs-8.17.0-lp152.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632620" comment="npm10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632225" comment="npm12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634500" comment="npm14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651581" comment="npm8-8.17.0-lp152.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22931</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632617" comment="nodejs10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632618" comment="nodejs10-devel-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632619" comment="nodejs10-docs-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632222" comment="nodejs12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632223" comment="nodejs12-devel-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632224" comment="nodejs12-docs-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634497" comment="nodejs14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634498" comment="nodejs14-devel-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634499" comment="nodejs14-docs-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632620" comment="npm10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632225" comment="npm12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634500" comment="npm14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22939</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632617" comment="nodejs10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632618" comment="nodejs10-devel-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632619" comment="nodejs10-docs-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632222" comment="nodejs12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632223" comment="nodejs12-devel-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632224" comment="nodejs12-docs-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634497" comment="nodejs14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634498" comment="nodejs14-devel-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634499" comment="nodejs14-docs-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632620" comment="npm10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632225" comment="npm12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634500" comment="npm14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22940</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632222" comment="nodejs12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632223" comment="nodejs12-devel-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632224" comment="nodejs12-docs-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634497" comment="nodejs14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634498" comment="nodejs14-devel-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634499" comment="nodejs14-docs-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632225" comment="npm12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634500" comment="npm14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22946</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009570.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRVRDNRDONYRGYKCIS6D72VODPDQT3AB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJISG4GC22MLBYTQB5THWN4V2IFZC7P/" source="SUSE-SU"/>
    <description>
    A user can tell curl &gt;= 7.20.0 and &lt;= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652717" comment="curl-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652718" comment="curl-mini-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652719" comment="libcurl-devel-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652720" comment="libcurl-devel-32bit-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652721" comment="libcurl-mini-devel-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652722" comment="libcurl4-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652723" comment="libcurl4-32bit-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652724" comment="libcurl4-mini-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22947</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009570.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRVRDNRDONYRGYKCIS6D72VODPDQT3AB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJISG4GC22MLBYTQB5THWN4V2IFZC7P/" source="SUSE-SU"/>
    <description>
    When curl &gt;= 7.20.0 and &lt;= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652717" comment="curl-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652718" comment="curl-mini-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652719" comment="libcurl-devel-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652720" comment="libcurl-devel-32bit-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652721" comment="libcurl-mini-devel-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652722" comment="libcurl4-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652723" comment="libcurl4-32bit-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652724" comment="libcurl4-mini-7.66.0-lp152.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp &lt; v2.1.4 and &lt; v6.0.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2296</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2296" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2296" ref_url="https://www.suse.com/security/cve/CVE-2021-2296" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2296/">CVE-2021-2296</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    The parse function in llhttp &lt; 2.1.4 and &lt; 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2297</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2297" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2297" ref_url="https://www.suse.com/security/cve/CVE-2021-2297" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2297/">CVE-2021-2297</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGLK2LDX6LXOTDRBNVVWP2BFD3ISKDXF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKTQ3CIPQ5OLG2MFTQXWBRDD66NWPZBF/" source="SUSE-SU"/>
    <description>
    A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017</cve>
	<bugzilla href="https://bugzilla.suse.com/1186126">SUSE bug 1186126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614989" comment="nginx-1.16.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614990" comment="nginx-source-1.16.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614991" comment="vim-plugin-nginx-1.16.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2306</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2306" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2306" ref_url="https://www.suse.com/security/cve/CVE-2021-2306" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2306/">CVE-2021-2306</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2309" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2309" ref_url="https://www.suse.com/security/cve/CVE-2021-2309" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2309/">CVE-2021-2309</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2310" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2310" ref_url="https://www.suse.com/security/cve/CVE-2021-2310" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2310/">CVE-2021-2310</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2312</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2312" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2312" ref_url="https://www.suse.com/security/cve/CVE-2021-2312" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2VYFQN75RCOBQFQCIU4LU7E32CGO4SK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2312/">CVE-2021-2312</cve>
	<bugzilla href="https://bugzilla.suse.com/1185211">SUSE bug 1185211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23134</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23192</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656595" comment="ctdb-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656596" comment="ctdb-pcp-pmda-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656597" comment="ctdb-tests-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656598" comment="libdcerpc-binding0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656599" comment="libdcerpc-binding0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656600" comment="libdcerpc-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656601" comment="libdcerpc-samr-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656602" comment="libdcerpc-samr0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656603" comment="libdcerpc-samr0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656604" comment="libdcerpc0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656605" comment="libdcerpc0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656606" comment="libndr-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656607" comment="libndr-krb5pac-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656608" comment="libndr-krb5pac0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656609" comment="libndr-krb5pac0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656610" comment="libndr-nbt-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656611" comment="libndr-nbt0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656612" comment="libndr-nbt0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656613" comment="libndr-standard-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656614" comment="libndr-standard0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656615" comment="libndr-standard0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656616" comment="libndr0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656617" comment="libndr0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656618" comment="libnetapi-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656619" comment="libnetapi-devel-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656620" comment="libnetapi0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656621" comment="libnetapi0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656622" comment="libsamba-credentials-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656623" comment="libsamba-credentials0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656624" comment="libsamba-credentials0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656625" comment="libsamba-errors-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656626" comment="libsamba-errors0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656627" comment="libsamba-errors0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656628" comment="libsamba-hostconfig-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656629" comment="libsamba-hostconfig0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656630" comment="libsamba-hostconfig0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656631" comment="libsamba-passdb-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656632" comment="libsamba-passdb0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656633" comment="libsamba-passdb0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656634" comment="libsamba-policy-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656635" comment="libsamba-policy-python3-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656636" comment="libsamba-policy0-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656637" comment="libsamba-policy0-python3-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656638" comment="libsamba-util-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656639" comment="libsamba-util0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656640" comment="libsamba-util0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656641" comment="libsamdb-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656642" comment="libsamdb0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656643" comment="libsamdb0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656644" comment="libsmbclient-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656645" comment="libsmbclient0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656646" comment="libsmbclient0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656647" comment="libsmbconf-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656648" comment="libsmbconf0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656649" comment="libsmbconf0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656650" comment="libsmbldap-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656651" comment="libsmbldap2-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656652" comment="libsmbldap2-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656653" comment="libtevent-util-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656654" comment="libtevent-util0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656655" comment="libtevent-util0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656656" comment="libwbclient-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656657" comment="libwbclient0-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656658" comment="libwbclient0-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656659" comment="samba-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656660" comment="samba-ad-dc-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656661" comment="samba-ad-dc-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656662" comment="samba-ceph-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656663" comment="samba-client-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656664" comment="samba-client-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656665" comment="samba-core-devel-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656666" comment="samba-doc-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656667" comment="samba-dsdb-modules-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656668" comment="samba-libs-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656669" comment="samba-libs-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656670" comment="samba-libs-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656671" comment="samba-libs-python3-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656672" comment="samba-python3-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656673" comment="samba-test-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656674" comment="samba-winbind-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656675" comment="samba-winbind-32bit-4.11.14+git.308.666c63d4eea-lp152.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FHULRUWHTA6S76CNBRNC5YGPUFBTRVW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY3TDIO4JWN2U76KHSAM3F7JGOFA3VEQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNALH7TSYYNMSZ7EMUEZ2S7IBYAU75OE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKUQ4NBJFXX6V3DRII3AKLC2VO5WMZJB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUBO5HPHOHRDPB6KNAQYGJRQBBZVFI6Z/" source="SUSE-SU"/>
    <description>
    When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659934" comment="postgresql10-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659935" comment="postgresql10-contrib-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659936" comment="postgresql10-devel-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659937" comment="postgresql10-docs-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659938" comment="postgresql10-plperl-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659939" comment="postgresql10-plpython-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659940" comment="postgresql10-pltcl-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659941" comment="postgresql10-server-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659942" comment="postgresql10-test-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23215" ref_url="https://www.suse.com/security/cve/CVE-2021-23215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23215/">CVE-2021-23215</cve>
	<bugzilla href="https://bugzilla.suse.com/1185216">SUSE bug 1185216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614510" comment="libIlmImf-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614511" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614512" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614513" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614514" comment="openexr-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614515" comment="openexr-devel-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614516" comment="openexr-doc-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FHULRUWHTA6S76CNBRNC5YGPUFBTRVW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY3TDIO4JWN2U76KHSAM3F7JGOFA3VEQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNALH7TSYYNMSZ7EMUEZ2S7IBYAU75OE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKUQ4NBJFXX6V3DRII3AKLC2VO5WMZJB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUBO5HPHOHRDPB6KNAQYGJRQBBZVFI6Z/" source="SUSE-SU"/>
    <description>
    A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659934" comment="postgresql10-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659935" comment="postgresql10-contrib-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659936" comment="postgresql10-devel-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659937" comment="postgresql10-docs-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659938" comment="postgresql10-plperl-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659939" comment="postgresql10-plpython-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659940" comment="postgresql10-pltcl-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659941" comment="postgresql10-server-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659942" comment="postgresql10-test-10.19-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23239</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612983" comment="sudo-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612984" comment="sudo-devel-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612985" comment="sudo-test-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23240</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612983" comment="sudo-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612984" comment="sudo-devel-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612985" comment="sudo-test-1.8.22-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23336</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LBJTTJNYOY4PWTVR3WGVSEX33BCEYHGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<bugzilla href="https://bugzilla.suse.com/1182179">SUSE bug 1182179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182433">SUSE bug 1182433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613778" comment="libpython2_7-1_0-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613779" comment="libpython2_7-1_0-32bit-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613780" comment="python-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613781" comment="python-32bit-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613782" comment="python-base-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613783" comment="python-base-32bit-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613784" comment="python-curses-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613785" comment="python-demo-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613786" comment="python-devel-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613787" comment="python-doc-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613788" comment="python-doc-pdf-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613789" comment="python-gdbm-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613790" comment="python-idle-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613791" comment="python-tk-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613792" comment="python-xml-2.7.18-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23358" ref_url="https://www.suse.com/security/cve/CVE-2021-23358" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYT735UU6WLJPI53DIIUEZ4OG2ZZSATO/" source="SUSE-SU"/>
    <description>
    The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-23358/">CVE-2021-23358</cve>
	<bugzilla href="https://bugzilla.suse.com/1184800">SUSE bug 1184800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614279" comment="nodejs-underscore-1.13.1-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351799" comment="nodejs-underscore is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625524" comment="nodejs14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625525" comment="nodejs14-devel-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625526" comment="nodejs14-docs-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629528" comment="nodejs8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629529" comment="nodejs8-devel-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629530" comment="nodejs8-docs-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625527" comment="npm14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629531" comment="npm8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2341</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632591" comment="java-11-openjdk-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632592" comment="java-11-openjdk-accessibility-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632593" comment="java-11-openjdk-demo-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632594" comment="java-11-openjdk-devel-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632595" comment="java-11-openjdk-headless-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632596" comment="java-11-openjdk-javadoc-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632597" comment="java-11-openjdk-jmods-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632598" comment="java-11-openjdk-src-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631509" comment="java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631510" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631511" comment="java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631512" comment="java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631513" comment="java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631514" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631515" comment="java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2369</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632591" comment="java-11-openjdk-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632592" comment="java-11-openjdk-accessibility-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632593" comment="java-11-openjdk-demo-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632594" comment="java-11-openjdk-devel-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632595" comment="java-11-openjdk-headless-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632596" comment="java-11-openjdk-javadoc-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632597" comment="java-11-openjdk-jmods-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632598" comment="java-11-openjdk-src-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631509" comment="java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631510" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631511" comment="java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631512" comment="java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631513" comment="java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631514" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631515" comment="java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613766" comment="libopenssl-1_0_0-devel-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613767" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613733" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613734" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613768" comment="libopenssl10-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338634" comment="libopenssl10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613769" comment="libopenssl1_0_0-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613770" comment="libopenssl1_0_0-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613771" comment="libopenssl1_0_0-hmac-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613772" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613773" comment="libopenssl1_0_0-steam-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613774" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613735" comment="libopenssl1_1-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613736" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613737" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613738" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613506" comment="nodejs10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613507" comment="nodejs10-devel-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613508" comment="nodejs10-docs-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613422" comment="nodejs12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613423" comment="nodejs12-devel-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613424" comment="nodejs12-docs-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613509" comment="npm10-10.24.0-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613425" comment="npm12-12.21.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613775" comment="openssl-1_0_0-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613776" comment="openssl-1_0_0-cavs-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613777" comment="openssl-1_0_0-doc-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613739" comment="openssl-1_1-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613740" comment="openssl-1_1-doc-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23841</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613766" comment="libopenssl-1_0_0-devel-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613767" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613733" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613734" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613768" comment="libopenssl10-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338634" comment="libopenssl10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613769" comment="libopenssl1_0_0-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613770" comment="libopenssl1_0_0-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613771" comment="libopenssl1_0_0-hmac-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613772" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613773" comment="libopenssl1_0_0-steam-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613774" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613735" comment="libopenssl1_1-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613736" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613737" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613738" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613775" comment="openssl-1_0_0-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613776" comment="openssl-1_0_0-cavs-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613777" comment="openssl-1_0_0-doc-1.0.2p-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613739" comment="openssl-1_1-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613740" comment="openssl-1_1-doc-1.1.1d-lp152.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632591" comment="java-11-openjdk-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632592" comment="java-11-openjdk-accessibility-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632593" comment="java-11-openjdk-demo-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632594" comment="java-11-openjdk-devel-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632595" comment="java-11-openjdk-headless-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632596" comment="java-11-openjdk-javadoc-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632597" comment="java-11-openjdk-jmods-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632598" comment="java-11-openjdk-src-11.0.12.0-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631509" comment="java-1_8_0-openjdk-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631510" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631511" comment="java-1_8_0-openjdk-demo-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631512" comment="java-1_8_0-openjdk-devel-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631513" comment="java-1_8_0-openjdk-headless-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631514" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631515" comment="java-1_8_0-openjdk-src-1.8.0.302-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613004" comment="MozillaFirefox-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613005" comment="MozillaFirefox-branding-upstream-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613006" comment="MozillaFirefox-buildsymbols-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613007" comment="MozillaFirefox-devel-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613008" comment="MozillaFirefox-translations-common-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613009" comment="MozillaFirefox-translations-other-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23954</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613004" comment="MozillaFirefox-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613005" comment="MozillaFirefox-branding-upstream-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613006" comment="MozillaFirefox-buildsymbols-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613007" comment="MozillaFirefox-devel-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613008" comment="MozillaFirefox-translations-common-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613009" comment="MozillaFirefox-translations-other-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613004" comment="MozillaFirefox-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613005" comment="MozillaFirefox-branding-upstream-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613006" comment="MozillaFirefox-buildsymbols-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613007" comment="MozillaFirefox-devel-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613008" comment="MozillaFirefox-translations-common-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613009" comment="MozillaFirefox-translations-other-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 85.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613004" comment="MozillaFirefox-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613005" comment="MozillaFirefox-branding-upstream-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613006" comment="MozillaFirefox-buildsymbols-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613007" comment="MozillaFirefox-devel-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613008" comment="MozillaFirefox-translations-common-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613009" comment="MozillaFirefox-translations-other-78.7.0-lp152.2.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612999" comment="MozillaThunderbird-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613000" comment="MozillaThunderbird-translations-common-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613001" comment="MozillaThunderbird-translations-other-78.7.0-lp152.2.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613510" comment="MozillaFirefox-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613511" comment="MozillaFirefox-branding-upstream-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613512" comment="MozillaFirefox-buildsymbols-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613513" comment="MozillaFirefox-devel-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613514" comment="MozillaFirefox-translations-common-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613515" comment="MozillaFirefox-translations-other-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613602" comment="MozillaThunderbird-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613603" comment="MozillaThunderbird-translations-common-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613604" comment="MozillaThunderbird-translations-other-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23969</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613510" comment="MozillaFirefox-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613511" comment="MozillaFirefox-branding-upstream-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613512" comment="MozillaFirefox-buildsymbols-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613513" comment="MozillaFirefox-devel-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613514" comment="MozillaFirefox-translations-common-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613515" comment="MozillaFirefox-translations-other-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613602" comment="MozillaThunderbird-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613603" comment="MozillaThunderbird-translations-common-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613604" comment="MozillaThunderbird-translations-other-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613510" comment="MozillaFirefox-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613511" comment="MozillaFirefox-branding-upstream-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613512" comment="MozillaFirefox-buildsymbols-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613513" comment="MozillaFirefox-devel-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613514" comment="MozillaFirefox-translations-common-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613515" comment="MozillaFirefox-translations-other-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613602" comment="MozillaThunderbird-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613603" comment="MozillaThunderbird-translations-common-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613604" comment="MozillaThunderbird-translations-other-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613510" comment="MozillaFirefox-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613511" comment="MozillaFirefox-branding-upstream-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613512" comment="MozillaFirefox-buildsymbols-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613513" comment="MozillaFirefox-devel-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613514" comment="MozillaFirefox-translations-common-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613515" comment="MozillaFirefox-translations-other-78.8.0-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613602" comment="MozillaThunderbird-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613603" comment="MozillaThunderbird-translations-common-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613604" comment="MozillaThunderbird-translations-other-78.8.0-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23980" ref_url="https://www.suse.com/security/cve/CVE-2021-23980" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YFAKMJGUZHUTZ53ZAID6PRVP5MSLXPGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAZHEWM4ZYBZY5GDDDOMIZYEGFNANLKS/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23980/">CVE-2021-23980</cve>
	<bugzilla href="https://bugzilla.suse.com/1184547">SUSE bug 1184547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614157" comment="python2-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279500" comment="python2-bleach is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614158" comment="python3-bleach-3.1.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279501" comment="python3-bleach is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613925" comment="MozillaFirefox-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613926" comment="MozillaFirefox-branding-upstream-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613927" comment="MozillaFirefox-buildsymbols-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613928" comment="MozillaFirefox-devel-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613929" comment="MozillaFirefox-translations-common-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613930" comment="MozillaFirefox-translations-other-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23982</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613925" comment="MozillaFirefox-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613926" comment="MozillaFirefox-branding-upstream-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613927" comment="MozillaFirefox-buildsymbols-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613928" comment="MozillaFirefox-devel-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613929" comment="MozillaFirefox-translations-common-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613930" comment="MozillaFirefox-translations-other-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613925" comment="MozillaFirefox-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613926" comment="MozillaFirefox-branding-upstream-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613927" comment="MozillaFirefox-buildsymbols-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613928" comment="MozillaFirefox-devel-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613929" comment="MozillaFirefox-translations-common-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613930" comment="MozillaFirefox-translations-other-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613925" comment="MozillaFirefox-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613926" comment="MozillaFirefox-branding-upstream-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613927" comment="MozillaFirefox-buildsymbols-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613928" comment="MozillaFirefox-devel-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613929" comment="MozillaFirefox-translations-common-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613930" comment="MozillaFirefox-translations-other-78.9.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23992" ref_url="https://www.suse.com/security/cve/CVE-2021-23992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23992/">CVE-2021-23992</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23993</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614212" comment="MozillaThunderbird-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614213" comment="MozillaThunderbird-translations-common-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614214" comment="MozillaThunderbird-translations-other-78.9.1-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23994</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23998</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24002</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24031</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24031" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24031" ref_url="https://www.suse.com/security/cve/CVE-2021-24031" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HYCURYHE4SZBA5XWHE6FDNCJ3JJDZS5S/" source="SUSE-SU"/>
    <description>
    In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24031/">CVE-2021-24031</cve>
	<bugzilla href="https://bugzilla.suse.com/1183371">SUSE bug 1183371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613871" comment="libzstd-devel-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262523" comment="libzstd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613872" comment="libzstd-devel-static-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262524" comment="libzstd-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613873" comment="libzstd1-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262525" comment="libzstd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613874" comment="libzstd1-32bit-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266836" comment="libzstd1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613875" comment="zstd-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262526" comment="zstd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24032" ref_url="https://www.suse.com/security/cve/CVE-2021-24032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HYCURYHE4SZBA5XWHE6FDNCJ3JJDZS5S/" source="SUSE-SU"/>
    <description>
    Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24032/">CVE-2021-24032</cve>
	<bugzilla href="https://bugzilla.suse.com/1183370">SUSE bug 1183370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183371">SUSE bug 1183371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613871" comment="libzstd-devel-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262523" comment="libzstd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613872" comment="libzstd-devel-static-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262524" comment="libzstd-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613873" comment="libzstd1-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262525" comment="libzstd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613874" comment="libzstd1-32bit-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266836" comment="libzstd1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613875" comment="zstd-1.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262526" comment="zstd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2409</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2409" ref_url="https://www.suse.com/security/cve/CVE-2021-2409" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQOOU7OS5PW5QXPE2UITMUDKYSU7JH54/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVEDYTCL4HZ2BYHJLWW2ON7AOWMAGAVD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2409/">CVE-2021-2409</cve>
	<bugzilla href="https://bugzilla.suse.com/1188536">SUSE bug 1188536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629532" comment="python3-virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629533" comment="virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629534" comment="virtualbox-devel-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629535" comment="virtualbox-guest-desktop-icons-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629536" comment="virtualbox-guest-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629537" comment="virtualbox-guest-tools-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629538" comment="virtualbox-guest-x11-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629539" comment="virtualbox-host-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629540" comment="virtualbox-kmp-default-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629541" comment="virtualbox-kmp-preempt-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629542" comment="virtualbox-qt-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629543" comment="virtualbox-vnc-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629544" comment="virtualbox-websrv-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24115" ref_url="https://www.suse.com/security/cve/CVE-2021-24115" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/66VDUR6MFH345POI2NK4EL4N3NCJVT5O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0794-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRODZQSOBHO3LLEEIA7RY3RIUCYF4FBC/" source="SUSE-SU"/>
    <description>
    In Botan before 2.17.3, constant-time computations are not used for certain decoding and encoding operations (base32, base58, base64, and hex).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-24115/">CVE-2021-24115</cve>
	<bugzilla href="https://bugzilla.suse.com/1182670">SUSE bug 1182670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615782" comment="Botan-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475537" comment="Botan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615783" comment="Botan-doc-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475539" comment="Botan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615784" comment="libbotan-2-10-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475541" comment="libbotan-2-10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009511050" comment="libbotan-2-10-32bit-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475542" comment="libbotan-2-10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615785" comment="libbotan-devel-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475544" comment="libbotan-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009511053" comment="libbotan-devel-32bit-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475545" comment="libbotan-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615786" comment="python3-botan-2.10.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009475547" comment="python3-botan is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24119</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24119" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24119" ref_url="https://www.suse.com/security/cve/CVE-2021-24119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUAORD5DVNESTJH3EH3OO36VCU4DKEPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1355-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C77WUNAX6B5WKSXJWBNNJZZKI6OORZNP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36R5MNRZX7IWOTML46RHIYNDAV7YDYQN/" source="SUSE-SU"/>
    <description>
    In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-24119/">CVE-2021-24119</cve>
	<bugzilla href="https://bugzilla.suse.com/1189589">SUSE bug 1189589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651582" comment="libmbedcrypto3-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346906" comment="libmbedcrypto3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651583" comment="libmbedcrypto3-32bit-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346907" comment="libmbedcrypto3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651584" comment="libmbedtls12-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346908" comment="libmbedtls12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651585" comment="libmbedtls12-32bit-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346909" comment="libmbedtls12-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651586" comment="libmbedx509-0-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346910" comment="libmbedx509-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651587" comment="libmbedx509-0-32bit-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346911" comment="libmbedx509-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651588" comment="mbedtls-devel-2.16.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152976" comment="mbedtls-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24122</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C43WR2IQX2RWDG6VXRG72VPTVZRF6TIY/" source="SUSE-SU"/>
    <description>
    When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613253" comment="tomcat-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613254" comment="tomcat-admin-webapps-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613255" comment="tomcat-docs-webapp-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613256" comment="tomcat-el-3_0-api-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613257" comment="tomcat-embed-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613258" comment="tomcat-javadoc-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613259" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613260" comment="tomcat-jsvc-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613261" comment="tomcat-lib-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613262" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613263" comment="tomcat-webapps-9.0.36-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2442</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2442" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2442" ref_url="https://www.suse.com/security/cve/CVE-2021-2442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQOOU7OS5PW5QXPE2UITMUDKYSU7JH54/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVEDYTCL4HZ2BYHJLWW2ON7AOWMAGAVD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-2442/">CVE-2021-2442</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629532" comment="python3-virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629533" comment="virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629534" comment="virtualbox-devel-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629535" comment="virtualbox-guest-desktop-icons-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629536" comment="virtualbox-guest-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629537" comment="virtualbox-guest-tools-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629538" comment="virtualbox-guest-x11-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629539" comment="virtualbox-host-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629540" comment="virtualbox-kmp-default-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629541" comment="virtualbox-kmp-preempt-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629542" comment="virtualbox-qt-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629543" comment="virtualbox-vnc-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629544" comment="virtualbox-websrv-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2443</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2443" ref_url="https://www.suse.com/security/cve/CVE-2021-2443" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQOOU7OS5PW5QXPE2UITMUDKYSU7JH54/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVEDYTCL4HZ2BYHJLWW2ON7AOWMAGAVD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Solaris x86 and Linux systems only. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2443/">CVE-2021-2443</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629532" comment="python3-virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629533" comment="virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629534" comment="virtualbox-devel-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629535" comment="virtualbox-guest-desktop-icons-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629536" comment="virtualbox-guest-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629537" comment="virtualbox-guest-tools-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629538" comment="virtualbox-guest-x11-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629539" comment="virtualbox-host-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629540" comment="virtualbox-kmp-default-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629541" comment="virtualbox-kmp-preempt-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629542" comment="virtualbox-qt-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629543" comment="virtualbox-vnc-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629544" comment="virtualbox-websrv-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2454</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2454" ref_url="https://www.suse.com/security/cve/CVE-2021-2454" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQOOU7OS5PW5QXPE2UITMUDKYSU7JH54/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVEDYTCL4HZ2BYHJLWW2ON7AOWMAGAVD/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-2454/">CVE-2021-2454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629532" comment="python3-virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629533" comment="virtualbox-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629534" comment="virtualbox-devel-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629535" comment="virtualbox-guest-desktop-icons-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629536" comment="virtualbox-guest-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629537" comment="virtualbox-guest-tools-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629538" comment="virtualbox-guest-x11-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629539" comment="virtualbox-host-source-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629540" comment="virtualbox-kmp-default-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629541" comment="virtualbox-kmp-preempt-6.1.26_k5.3.18_lp152.84-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629542" comment="virtualbox-qt-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629543" comment="virtualbox-vnc-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629544" comment="virtualbox-websrv-6.1.26-lp152.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2475</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2475" ref_url="https://www.suse.com/security/cve/CVE-2021-2475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVTOCSVAK2EXN2GDT2LDLTD72RKC2CAY/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-2475/">CVE-2021-2475</cve>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653786" comment="python3-virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653787" comment="virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653788" comment="virtualbox-devel-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653789" comment="virtualbox-guest-desktop-icons-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653790" comment="virtualbox-guest-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653791" comment="virtualbox-guest-tools-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653792" comment="virtualbox-guest-x11-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653793" comment="virtualbox-host-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653794" comment="virtualbox-kmp-default-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653795" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653796" comment="virtualbox-qt-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653797" comment="virtualbox-vnc-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653798" comment="virtualbox-websrv-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25122</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YM4ON24PW3U3JLLUNZBOOTDHDHK3EYVO/" source="SUSE-SU"/>
    <description>
    When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122</cve>
	<bugzilla href="https://bugzilla.suse.com/1182912">SUSE bug 1182912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613942" comment="tomcat-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613943" comment="tomcat-admin-webapps-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613944" comment="tomcat-docs-webapp-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613945" comment="tomcat-el-3_0-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613946" comment="tomcat-embed-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613947" comment="tomcat-javadoc-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613948" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613949" comment="tomcat-jsvc-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613950" comment="tomcat-lib-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613951" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613952" comment="tomcat-webapps-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.8.5 -&gt; 9.8.8, 9.9.3 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614488" comment="bind-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614489" comment="bind-chrootenv-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614490" comment="bind-devel-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614491" comment="bind-devel-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614492" comment="bind-doc-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614493" comment="bind-utils-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614494" comment="libbind9-1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614495" comment="libbind9-1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614496" comment="libdns1605-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614497" comment="libdns1605-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614498" comment="libirs-devel-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614499" comment="libirs1601-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614500" comment="libirs1601-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614501" comment="libisc1606-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614502" comment="libisc1606-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614503" comment="libisccc1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614504" comment="libisccc1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614505" comment="libisccfg1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614506" comment="libisccfg1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614507" comment="libns1604-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614508" comment="libns1604-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614509" comment="python3-bind-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189848">SUSE bug 1189848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199298">SUSE bug 1199298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614488" comment="bind-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614489" comment="bind-chrootenv-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614490" comment="bind-devel-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614491" comment="bind-devel-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614492" comment="bind-doc-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614493" comment="bind-utils-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614494" comment="libbind9-1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614495" comment="libbind9-1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614496" comment="libdns1605-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614497" comment="libdns1605-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614498" comment="libirs-devel-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614499" comment="libirs1601-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614500" comment="libirs1601-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614501" comment="libisc1606-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614502" comment="libisc1606-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614503" comment="libisccc1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614504" comment="libisccc1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614505" comment="libisccfg1600-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614506" comment="libisccfg1600-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614507" comment="libns1604-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614508" comment="libns1604-32bit-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614509" comment="python3-bind-9.16.6-lp152.14.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DK63QGFHTXASYR656326B4ARJWN2LQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THX5XKYZAL23HUQMVLFS3L572S4DHQUX/" source="SUSE-SU"/>
    <description>
    In ISC DHCP 4.1-ESV-R1 -&gt; 4.1-ESV-R16, ISC DHCP 4.4.0 -&gt; 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189843">SUSE bug 1189843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189858">SUSE bug 1189858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199299">SUSE bug 1199299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614983" comment="dhcp-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614984" comment="dhcp-client-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614985" comment="dhcp-devel-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153188" comment="dhcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614986" comment="dhcp-doc-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614987" comment="dhcp-relay-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614988" comment="dhcp-server-4.3.6.P1-lp152.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BH5L6EVZD44DQGVSOTGIGWP2H7IUPK2N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J67T6X7DSN2PDCNE3ENLU6MB6USV53JZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJ7DM7F3IHCRMEZDBDGMA5O6A5EWNQKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.3.0 -&gt; 9.11.35, 9.12.0 -&gt; 9.16.21, and versions 9.9.3-S1 -&gt; 9.11.35-S1 and 9.16.8-S1 -&gt; 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657913" comment="bind-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657914" comment="bind-chrootenv-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657915" comment="bind-devel-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657916" comment="bind-devel-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657917" comment="bind-doc-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657918" comment="bind-utils-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657919" comment="libbind9-1600-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657920" comment="libbind9-1600-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657921" comment="libdns1605-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657922" comment="libdns1605-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657923" comment="libirs-devel-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657924" comment="libirs1601-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657925" comment="libirs1601-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657926" comment="libisc1606-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657927" comment="libisc1606-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657928" comment="libisccc1600-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657929" comment="libisccc1600-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657930" comment="libisccfg1600-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657931" comment="libisccfg1600-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657932" comment="libns1604-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657933" comment="libns1604-32bit-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657934" comment="python3-bind-9.16.6-lp152.14.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25281</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25281" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25282</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25282" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25283" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25289</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289</cve>
	<bugzilla href="https://bugzilla.suse.com/1183103">SUSE bug 1183103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25290</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290</cve>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25291</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25291" ref_url="https://www.suse.com/security/cve/CVE-2021-25291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25291/">CVE-2021-25291</cve>
	<bugzilla href="https://bugzilla.suse.com/1183106">SUSE bug 1183106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25292</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25292" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292</cve>
	<bugzilla href="https://bugzilla.suse.com/1183101">SUSE bug 1183101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25293</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25293" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293</cve>
	<bugzilla href="https://bugzilla.suse.com/1183102">SUSE bug 1183102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25314" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25314" ref_url="https://www.suse.com/security/cve/CVE-2021-25314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P6Y6RW5YXKZSLM7CRGCZD5EXRQATEN6Q/" source="SUSE-SU"/>
    <description>
    A Creation of Temporary File With Insecure Permissions vulnerability in hawk2 of SUSE Linux Enterprise High Availability 12-SP3, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Availability 15-SP2 allows local attackers to escalate to root. This issue affects: SUSE Linux Enterprise High Availability 12-SP3 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 12-SP5 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 15-SP2 hawk2 versions prior to 2.6.3+git.1614684118.af555ad9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25314/">CVE-2021-25314</cve>
	<bugzilla href="https://bugzilla.suse.com/1182166">SUSE bug 1182166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183693">SUSE bug 1183693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613859" comment="hawk2-2.6.3+git.1614684118.af555ad9-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25315</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25315" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25317</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25317" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GKB5OH3W4MLNXHW3ZQK7GEVLAEMXZ7C/" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192358">SUSE bug 1192358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614447" comment="cups-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614448" comment="cups-client-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614449" comment="cups-config-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614450" comment="cups-ddk-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614451" comment="cups-devel-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614452" comment="cups-devel-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614453" comment="libcups2-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614454" comment="libcups2-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614455" comment="libcupscgi1-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614456" comment="libcupscgi1-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614457" comment="libcupsimage2-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614458" comment="libcupsimage2-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614459" comment="libcupsmime1-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614460" comment="libcupsmime1-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614461" comment="libcupsppdc1-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614462" comment="libcupsppdc1-32bit-2.2.7-lp152.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25319</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25319" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25319" ref_url="https://www.suse.com/security/cve/CVE-2021-25319" source="SUSE CVE"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-25319/">CVE-2021-25319</cve>
	<bugzilla href="https://bugzilla.suse.com/1182918">SUSE bug 1182918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614652" comment="python3-virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614653" comment="virtualbox-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614654" comment="virtualbox-devel-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614655" comment="virtualbox-guest-desktop-icons-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614656" comment="virtualbox-guest-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614657" comment="virtualbox-guest-tools-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614658" comment="virtualbox-guest-x11-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614659" comment="virtualbox-host-source-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614660" comment="virtualbox-kmp-default-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614661" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_lp152.75-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614662" comment="virtualbox-qt-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614663" comment="virtualbox-vnc-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614664" comment="virtualbox-websrv-6.1.22-lp152.2.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25321</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25321" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7SKTH3533HITV3EN436RULMJP2HHQND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE7IGDIJ6QCS3LA5C7SC67VRDUWKSAEV/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624090" comment="arpwatch-2.1a15-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623984" comment="arpwatch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624091" comment="arpwatch-ethercodes-build-2.1a15-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623985" comment="arpwatch-ethercodes-build is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25329</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YM4ON24PW3U3JLLUNZBOOTDHDHK3EYVO/" source="SUSE-SU"/>
    <description>
    The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613942" comment="tomcat-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613943" comment="tomcat-admin-webapps-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613944" comment="tomcat-docs-webapp-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613945" comment="tomcat-el-3_0-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613946" comment="tomcat-embed-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613947" comment="tomcat-javadoc-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613948" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613949" comment="tomcat-jsvc-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613950" comment="tomcat-lib-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613951" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613952" comment="tomcat-webapps-9.0.36-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25900" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008690.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJTKYUPH7JWPY376WTC427MFFFZQ7U7L/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the smallvec crate before 0.6.14 and 1.x before 1.6.1 for Rust. There is a heap-based buffer overflow in SmallVec::insert_many.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900</cve>
	<bugzilla href="https://bugzilla.suse.com/1183403">SUSE bug 1183403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614338" comment="gdk-pixbuf-loader-rsvg-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614339" comment="gdk-pixbuf-loader-rsvg-32bit-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153668" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614340" comment="librsvg-2-2-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614341" comment="librsvg-2-2-32bit-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153670" comment="librsvg-2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614342" comment="librsvg-devel-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614343" comment="librsvg-lang-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353379" comment="librsvg-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614344" comment="rsvg-convert-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353380" comment="rsvg-convert is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614345" comment="rsvg-thumbnailer-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161885" comment="rsvg-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614346" comment="typelib-1_0-Rsvg-2_0-2.46.5-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26220" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    The ezxml_toxml function in ezxml 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26260</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26260" ref_url="https://www.suse.com/security/cve/CVE-2021-26260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26260/">CVE-2021-26260</cve>
	<bugzilla href="https://bugzilla.suse.com/1185217">SUSE bug 1185217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614510" comment="libIlmImf-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614511" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614512" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614513" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614514" comment="openexr-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614515" comment="openexr-devel-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614516" comment="openexr-doc-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26675" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26675" ref_url="https://www.suse.com/security/cve/CVE-2021-26675" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0416-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTS3LYTIBT7XMBIAK6RCJOKOTPNIEQSF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6R3XK5JUBLJRIRVG3PVC2DOVU5KBVK/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-26675/">CVE-2021-26675</cve>
	<bugzilla href="https://bugzilla.suse.com/1181751">SUSE bug 1181751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186869">SUSE bug 1186869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613697" comment="connman-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347742" comment="connman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613698" comment="connman-client-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347743" comment="connman-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613699" comment="connman-devel-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347744" comment="connman-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613700" comment="connman-doc-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347745" comment="connman-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613701" comment="connman-nmcompat-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347746" comment="connman-nmcompat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613702" comment="connman-plugin-hh2serial-gps-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347747" comment="connman-plugin-hh2serial-gps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613703" comment="connman-plugin-iospm-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347748" comment="connman-plugin-iospm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613704" comment="connman-plugin-l2tp-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347749" comment="connman-plugin-l2tp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613705" comment="connman-plugin-openconnect-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347750" comment="connman-plugin-openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613706" comment="connman-plugin-openvpn-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347751" comment="connman-plugin-openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613707" comment="connman-plugin-polkit-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347752" comment="connman-plugin-polkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613708" comment="connman-plugin-pptp-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347753" comment="connman-plugin-pptp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613709" comment="connman-plugin-tist-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347754" comment="connman-plugin-tist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613710" comment="connman-plugin-vpnc-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347755" comment="connman-plugin-vpnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613711" comment="connman-plugin-wireguard-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347756" comment="connman-plugin-wireguard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613712" comment="connman-test-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347757" comment="connman-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26676" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26676" ref_url="https://www.suse.com/security/cve/CVE-2021-26676" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0416-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTS3LYTIBT7XMBIAK6RCJOKOTPNIEQSF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6R3XK5JUBLJRIRVG3PVC2DOVU5KBVK/" source="SUSE-SU"/>
    <description>
    gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-26676/">CVE-2021-26676</cve>
	<bugzilla href="https://bugzilla.suse.com/1181751">SUSE bug 1181751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186869">SUSE bug 1186869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613697" comment="connman-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347742" comment="connman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613698" comment="connman-client-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347743" comment="connman-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613699" comment="connman-devel-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347744" comment="connman-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613700" comment="connman-doc-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347745" comment="connman-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613701" comment="connman-nmcompat-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347746" comment="connman-nmcompat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613702" comment="connman-plugin-hh2serial-gps-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347747" comment="connman-plugin-hh2serial-gps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613703" comment="connman-plugin-iospm-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347748" comment="connman-plugin-iospm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613704" comment="connman-plugin-l2tp-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347749" comment="connman-plugin-l2tp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613705" comment="connman-plugin-openconnect-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347750" comment="connman-plugin-openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613706" comment="connman-plugin-openvpn-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347751" comment="connman-plugin-openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613707" comment="connman-plugin-polkit-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347752" comment="connman-plugin-polkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613708" comment="connman-plugin-pptp-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347753" comment="connman-plugin-pptp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613709" comment="connman-plugin-tist-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347754" comment="connman-plugin-tist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613710" comment="connman-plugin-vpnc-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347755" comment="connman-plugin-vpnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613711" comment="connman-plugin-wireguard-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347756" comment="connman-plugin-wireguard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613712" comment="connman-test-1.39-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347757" comment="connman-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26691</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVDVPBVHRZSZM5XAK6X7A5RCIHNQNEG5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAJ7F7M4LLALLHLSQR7PD7HCTVHGAFMX/" source="SUSE-SU"/>
    <description>
    avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180865">SUSE bug 1180865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181852">SUSE bug 1181852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186412">SUSE bug 1186412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613477" comment="avahi-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613478" comment="avahi-autoipd-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613479" comment="avahi-compat-howl-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613480" comment="avahi-compat-mDNSResponder-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613481" comment="avahi-lang-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613482" comment="avahi-mono-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243731" comment="avahi-mono is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613483" comment="avahi-utils-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613484" comment="avahi-utils-gtk-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613485" comment="libavahi-client3-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613486" comment="libavahi-client3-32bit-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151213" comment="libavahi-client3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613487" comment="libavahi-common3-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613488" comment="libavahi-common3-32bit-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151215" comment="libavahi-common3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613489" comment="libavahi-core7-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613490" comment="libavahi-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613491" comment="libavahi-glib-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613492" comment="libavahi-glib1-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613493" comment="libavahi-glib1-32bit-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243737" comment="libavahi-glib1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613494" comment="libavahi-gobject-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613495" comment="libavahi-gobject0-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613496" comment="libavahi-qt4-1-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243740" comment="libavahi-qt4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613497" comment="libavahi-qt4-devel-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243741" comment="libavahi-qt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613498" comment="libavahi-ui-gtk3-0-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613499" comment="libavahi-ui0-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243743" comment="libavahi-ui0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613500" comment="libdns_sd-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613501" comment="libdns_sd-32bit-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243744" comment="libdns_sd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613502" comment="libhowl0-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613503" comment="python3-avahi-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346636" comment="python3-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613504" comment="python3-avahi-gtk-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613505" comment="typelib-1_0-Avahi-0_6-0.7-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26813" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26813" ref_url="https://www.suse.com/security/cve/CVE-2021-26813" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VPKRS46KKKFGLEDJJ7ZX2EZVNE5567H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4AZ6CPAAHWZ74LZWHDSAXWA6O2HYCKU3/" source="SUSE-SU"/>
    <description>
    markdown2 &gt;=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-26813/">CVE-2021-26813</cve>
	<bugzilla href="https://bugzilla.suse.com/1183171">SUSE bug 1183171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613753" comment="python2-markdown2-2.4.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283130" comment="python2-markdown2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613754" comment="python3-markdown2-2.4.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283131" comment="python3-markdown2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26910</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26910" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26910" ref_url="https://www.suse.com/security/cve/CVE-2021-26910" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJKSV64EI6OP7AKHJQVLFPJPOUXRN47F/" source="SUSE-SU"/>
    <description>
    Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-26910/">CVE-2021-26910</cve>
	<bugzilla href="https://bugzilla.suse.com/1181990">SUSE bug 1181990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613135" comment="firejail-0.9.64.4-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291476" comment="firejail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26930</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26931</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26932</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613616" comment="kernel-debug-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613617" comment="kernel-debug-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613618" comment="kernel-default-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613619" comment="kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613620" comment="kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613621" comment="kernel-default-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613622" comment="kernel-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613623" comment="kernel-docs-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613624" comment="kernel-docs-html-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613625" comment="kernel-kvmsmall-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613626" comment="kernel-kvmsmall-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613627" comment="kernel-macros-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613628" comment="kernel-obs-build-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613629" comment="kernel-obs-qa-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613630" comment="kernel-preempt-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613631" comment="kernel-preempt-devel-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613632" comment="kernel-source-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613633" comment="kernel-source-vanilla-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613634" comment="kernel-syms-5.3.18-lp152.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26937</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008337.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYNLKAL7KI2RT6BUJQ25AIHB4Q2CRI2D/" source="SUSE-SU"/>
    <description>
    encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613192" comment="screen-4.6.2-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177244" comment="screen is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0900-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA47BC6O5V73WVZQL44IERDWF2OCBQYV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSHLMCUKP3HZEQVMO6GPO4MIFBHEZ53K/" source="SUSE-SU"/>
    <description>
    xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189857">SUSE bug 1189857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190262">SUSE bug 1190262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615143" comment="xterm-330-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479911" comment="xterm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615144" comment="xterm-bin-330-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479912" comment="xterm-bin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27212</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613675" comment="libldap-2_4-2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613676" comment="libldap-2_4-2-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613677" comment="libldap-data-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613678" comment="openldap2-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613679" comment="openldap2-back-meta-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613680" comment="openldap2-back-perl-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613681" comment="openldap2-back-sock-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613682" comment="openldap2-back-sql-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613683" comment="openldap2-client-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613684" comment="openldap2-contrib-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613685" comment="openldap2-devel-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613686" comment="openldap2-devel-32bit-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613687" comment="openldap2-devel-static-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613688" comment="openldap2-doc-2.4.46-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613689" comment="openldap2-ppolicy-check-password-1.2-lp152.14.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613653" comment="gio-branding-upstream-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613654" comment="glib2-devel-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613655" comment="glib2-devel-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241265" comment="glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613656" comment="glib2-devel-static-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613657" comment="glib2-lang-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613658" comment="glib2-tests-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347480" comment="glib2-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613659" comment="glib2-tools-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613660" comment="glib2-tools-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241267" comment="glib2-tools-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613661" comment="libgio-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613662" comment="libgio-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151146" comment="libgio-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613663" comment="libgio-fam-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241268" comment="libgio-fam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613664" comment="libgio-fam-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241269" comment="libgio-fam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613665" comment="libglib-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613666" comment="libglib-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151148" comment="libglib-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613667" comment="libgmodule-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613668" comment="libgmodule-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151150" comment="libgmodule-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613669" comment="libgobject-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613670" comment="libgobject-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151152" comment="libgobject-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613671" comment="libgthread-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613672" comment="libgthread-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151154" comment="libgthread-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194015">SUSE bug 1194015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613653" comment="gio-branding-upstream-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613654" comment="glib2-devel-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613655" comment="glib2-devel-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241265" comment="glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613656" comment="glib2-devel-static-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613657" comment="glib2-lang-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613658" comment="glib2-tests-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347480" comment="glib2-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613659" comment="glib2-tools-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613660" comment="glib2-tools-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241267" comment="glib2-tools-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613661" comment="libgio-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613662" comment="libgio-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151146" comment="libgio-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613663" comment="libgio-fam-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241268" comment="libgio-fam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613664" comment="libgio-fam-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241269" comment="libgio-fam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613665" comment="libglib-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613666" comment="libglib-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151148" comment="libglib-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613667" comment="libgmodule-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613668" comment="libgmodule-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151150" comment="libgmodule-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613669" comment="libgobject-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613670" comment="libgobject-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151152" comment="libgobject-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613671" comment="libgthread-2_0-0-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613672" comment="libgthread-2_0-0-32bit-2.62.6-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151154" comment="libgthread-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27290</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625524" comment="nodejs14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625525" comment="nodejs14-devel-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625526" comment="nodejs14-docs-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629528" comment="nodejs8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629529" comment="nodejs8-devel-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629530" comment="nodejs8-docs-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625527" comment="npm14-14.17.2-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629531" comment="npm8-8.17.0-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27291</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009793.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2O2K274EQSHKSL5YSPYVHDKM5IDGONQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3839-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRWPXQ63T5F7TBOHNMOYC2M33UFGF4XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y2LPAJNM32W4DEWWWLTSSKXRXVTPDXJQ/" source="SUSE-SU"/>
    <description>
    In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291</cve>
	<bugzilla href="https://bugzilla.suse.com/1184812">SUSE bug 1184812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659014" comment="python3-Pygments-2.6.1-lp152.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350179" comment="python3-Pygments is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
    <description>
    The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358</cve>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630897" comment="grafana-7.5.7-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27363</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27364</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27365</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN5W6CW6RWRS7CCRSXMP44CTJQY53RIS/" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613637" comment="wpa_supplicant-2.9-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613638" comment="wpa_supplicant-gui-2.9-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PG5AXR4LXEWYU5DHYEVESCXWKO3HFHO/" source="SUSE-SU"/>
    <description>
    encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918</cve>
	<bugzilla href="https://bugzilla.suse.com/1183333">SUSE bug 1183333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613868" comment="go1.15-1.15.10-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613869" comment="go1.15-doc-1.15.10-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613870" comment="go1.15-race-1.15.10-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27921</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27921" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921</cve>
	<bugzilla href="https://bugzilla.suse.com/1183110">SUSE bug 1183110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922</cve>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27923</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923</cve>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27962" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27962" ref_url="https://www.suse.com/security/cve/CVE-2021-27962" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-27962/">CVE-2021-27962</cve>
	<bugzilla href="https://bugzilla.suse.com/1184371">SUSE bug 1184371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631120" comment="ansible-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631121" comment="ansible-doc-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631122" comment="ansible-test-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631123" comment="dracut-saltboot-0.1.1627546504.96a0b3e-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631124" comment="golang-github-prometheus-prometheus-2.27.1-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630897" comment="grafana-7.5.7-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28089</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28089" ref_url="https://www.suse.com/security/cve/CVE-2021-28089" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSB44OD563RNCPQDPKFNUKGO3WVL7M4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34QNXQE32JN77ED4VWLDVQOC4MRKET6/" source="SUSE-SU"/>
    <description>
    Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28089/">CVE-2021-28089</cve>
	<bugzilla href="https://bugzilla.suse.com/1183726">SUSE bug 1183726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184261">SUSE bug 1184261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613809" comment="tor-0.4.5.7-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28090</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28090" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28090" ref_url="https://www.suse.com/security/cve/CVE-2021-28090" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSB44OD563RNCPQDPKFNUKGO3WVL7M4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34QNXQE32JN77ED4VWLDVQOC4MRKET6/" source="SUSE-SU"/>
    <description>
    Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28090/">CVE-2021-28090</cve>
	<bugzilla href="https://bugzilla.suse.com/1183726">SUSE bug 1183726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184261">SUSE bug 1184261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613809" comment="tor-0.4.5.7-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28091</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVAZRUCJGDCHRY6W5ARRO5NRB27JQCR6/" source="SUSE-SU"/>
    <description>
    Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091</cve>
	<bugzilla href="https://bugzilla.suse.com/1186768">SUSE bug 1186768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625512" comment="liblasso-devel-2.6.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625538" comment="liblasso-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625513" comment="liblasso3-2.6.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625539" comment="liblasso3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625514" comment="python3-lasso-2.6.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625540" comment="python3-lasso is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28116" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116" source="SUSE CVE"/>
		<reference ref_id="GHSA-rgf3-9v3p-qp82" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-rgf3-9v3p-qp82" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NZHVBTOAFMYNYOVMQUSRJMITM2FJLGC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZT7QFDJXMSX6NXIB2FSSHOCTFVNNNMF/" source="SUSE-SU"/>
    <description>
    Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116</cve>
	<bugzilla href="https://bugzilla.suse.com/1189403">SUSE bug 1189403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653850" comment="squid-4.17-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28146</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28146" ref_url="https://www.suse.com/security/cve/CVE-2021-28146" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams. This can be used to grant a user team permissions that the user isn't supposed to have.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28146/">CVE-2021-28146</cve>
	<bugzilla href="https://bugzilla.suse.com/1183811">SUSE bug 1183811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631120" comment="ansible-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631121" comment="ansible-doc-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631122" comment="ansible-test-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631123" comment="dracut-saltboot-0.1.1627546504.96a0b3e-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631124" comment="golang-github-prometheus-prometheus-2.27.1-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630897" comment="grafana-7.5.7-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28147</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28147" ref_url="https://www.suse.com/security/cve/CVE-2021-28147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    The team sync HTTP API in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service and having the EditorsCanAdmin feature enabled, this vulnerability allows any authenticated user to add external groups to any existing team. This can be used to grant a user team permissions that the user isn't supposed to have.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28147/">CVE-2021-28147</cve>
	<bugzilla href="https://bugzilla.suse.com/1183809">SUSE bug 1183809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631120" comment="ansible-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631121" comment="ansible-doc-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631122" comment="ansible-test-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631123" comment="dracut-saltboot-0.1.1627546504.96a0b3e-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631124" comment="golang-github-prometheus-prometheus-2.27.1-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630897" comment="grafana-7.5.7-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28148</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28148" ref_url="https://www.suse.com/security/cve/CVE-2021-28148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    One of the usage insights HTTP API endpoints in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 is accessible without any authentication. This allows any unauthenticated user to send an unlimited number of requests to the endpoint, leading to a denial of service (DoS) attack against a Grafana Enterprise instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28148/">CVE-2021-28148</cve>
	<bugzilla href="https://bugzilla.suse.com/1183813">SUSE bug 1183813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631120" comment="ansible-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631121" comment="ansible-doc-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631122" comment="ansible-test-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631123" comment="dracut-saltboot-0.1.1627546504.96a0b3e-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631124" comment="golang-github-prometheus-prometheus-2.27.1-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630897" comment="grafana-7.5.7-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291397" comment="grafana is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28210</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O64FXHJK5XXCJEHCRQJDNI2X2UVMP6BS/" source="SUSE-SU"/>
    <description>
    An unlimited recursion in DxeCore in EDK II.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210</cve>
	<bugzilla href="https://bugzilla.suse.com/1183579">SUSE bug 1183579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613937" comment="ovmf-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613938" comment="ovmf-tools-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613939" comment="qemu-ovmf-ia32-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613940" comment="qemu-ovmf-x86_64-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613941" comment="qemu-ovmf-x86_64-debug-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28211</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O64FXHJK5XXCJEHCRQJDNI2X2UVMP6BS/" source="SUSE-SU"/>
    <description>
    A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211</cve>
	<bugzilla href="https://bugzilla.suse.com/1183578">SUSE bug 1183578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613937" comment="ovmf-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613938" comment="ovmf-tools-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613939" comment="qemu-ovmf-ia32-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613940" comment="qemu-ovmf-x86_64-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613941" comment="qemu-ovmf-x86_64-debug-201911-lp152.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28375</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184955">SUSE bug 1184955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28421" ref_url="https://www.suse.com/security/cve/CVE-2021-28421" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNUDR3JYL7FMN2WT7ZNGG6ZC25ZEFXE5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IQRGNVMOVEAGQCKTOUFZLDHYPRCXEES/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-21417. Reason: This candidate is a duplicate of CVE-2021-21417. Notes: All CVE users should reference CVE-2021-21417 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-28421/">CVE-2021-28421</cve>
	<bugzilla href="https://bugzilla.suse.com/1184705">SUSE bug 1184705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614159" comment="fluidsynth-1.1.11-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351203" comment="fluidsynth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614160" comment="fluidsynth-devel-1.1.11-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351204" comment="fluidsynth-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614161" comment="libfluidsynth1-1.1.11-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351205" comment="libfluidsynth1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614162" comment="libfluidsynth1-32bit-1.1.11-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351206" comment="libfluidsynth1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28651" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651" source="SUSE CVE"/>
		<reference ref_id="GHSA-ch36-9jhx-phm4" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-ch36-9jhx-phm4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615080" comment="squid-4.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28652" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652" source="SUSE CVE"/>
		<reference ref_id="GHSA-m47m-9hvw-7447" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-m47m-9hvw-7447" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652</cve>
	<bugzilla href="https://bugzilla.suse.com/1185918">SUSE bug 1185918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615080" comment="squid-4.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -&gt;ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28662</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28662" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662" source="SUSE CVE"/>
		<reference ref_id="GHSA-jjq6-mh2h-g39h" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-jjq6-mh2h-g39h" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662</cve>
	<bugzilla href="https://bugzilla.suse.com/1185919">SUSE bug 1185919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615080" comment="squid-4.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
    <description>
    HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the "soft reset" feature was implemented, the libxl__domain_suspend_state structure didn't require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the "soft reset" path wasn't refactored to call the initialization function. When a guest nwo initiates a "soft reboot", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes "leak" resources, then repeated crashes could use up resources, also causing a system-wide DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687</cve>
	<bugzilla href="https://bugzilla.suse.com/1183072">SUSE bug 1183072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613966" comment="xen-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613967" comment="xen-devel-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613968" comment="xen-doc-html-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613969" comment="xen-libs-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613970" comment="xen-libs-32bit-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613971" comment="xen-tools-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613972" comment="xen-tools-domU-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613973" comment="xen-tools-xendomains-wait-disk-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28688</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28692</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693</cve>
	<bugzilla href="https://bugzilla.suse.com/1186428">SUSE bug 1186428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28697</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699</cve>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194306">SUSE bug 1194306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700</cve>
	<bugzilla href="https://bugzilla.suse.com/1189381">SUSE bug 1189381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632609" comment="xen-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632610" comment="xen-devel-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632611" comment="xen-doc-html-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632612" comment="xen-libs-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632613" comment="xen-libs-32bit-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632614" comment="xen-tools-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632615" comment="xen-tools-domU-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632616" comment="xen-tools-xendomains-wait-disk-4.13.3_02-lp152.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28701</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOWOZIQD7FWDNFL7CQF3WO5KZFKYYTDP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4HJ2XF2SFYPRBAICENTSEBE5KO7OY2G/" source="SUSE-SU"/>
    <description>
    Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633715" comment="xen-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633716" comment="xen-devel-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633717" comment="xen-doc-html-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633718" comment="xen-libs-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633719" comment="xen-libs-32bit-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633720" comment="xen-tools-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633721" comment="xen-tools-domU-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633722" comment="xen-tools-xendomains-wait-disk-4.13.3_04-lp152.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28702</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702</cve>
	<bugzilla href="https://bugzilla.suse.com/1191363">SUSE bug 1191363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28706</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659213" comment="xen-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659214" comment="xen-devel-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659215" comment="xen-doc-html-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659216" comment="xen-libs-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659217" comment="xen-libs-32bit-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659218" comment="xen-tools-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659219" comment="xen-tools-domU-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659220" comment="xen-tools-xendomains-wait-disk-4.13.4_02-lp152.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28831</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653806" comment="busybox-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653807" comment="busybox-static-1.26.2-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28899</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28899" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28899" ref_url="https://www.suse.com/security/cve/CVE-2021-28899" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7ZOGH7UAC6Q7OJHR62KOMWS64YF4G73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVAIO7EGOGXSM6FEUKEC7Y4DAXYMXOPX/" source="SUSE-SU"/>
    <description>
    Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28899/">CVE-2021-28899</cve>
	<bugzilla href="https://bugzilla.suse.com/1185874">SUSE bug 1185874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615190" comment="libBasicUsageEnvironment1-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615191" comment="libUsageEnvironment3-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615192" comment="libgroupsock30-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479974" comment="libgroupsock30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615193" comment="libliveMedia94-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479975" comment="libliveMedia94 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615194" comment="live555-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615195" comment="live555-devel-2021.05.22-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28950</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0607-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMW3G6JZK6A7ZRJZ7VOMELHWOQBYPIOY/" source="SUSE-SU"/>
    <description>
    The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965</cve>
	<bugzilla href="https://bugzilla.suse.com/1184644">SUSE bug 1184644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614301" comment="libruby2_5-2_5-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614302" comment="ruby2.5-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614303" comment="ruby2.5-devel-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614304" comment="ruby2.5-devel-extra-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614305" comment="ruby2.5-doc-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614306" comment="ruby2.5-doc-ri-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614307" comment="ruby2.5-stdlib-2.5.9-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28971" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29133" ref_url="https://www.suse.com/security/cve/CVE-2021-29133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVYZKN3OCXW2QGY6YJEPECSXP6JIERGL/" source="SUSE-SU"/>
    <description>
    Lack of verification in haserl, a component of Alpine Linux Configuration Framework, before 0.9.36 allows local users to read the contents of any file on the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29133/">CVE-2021-29133</cve>
	<bugzilla href="https://bugzilla.suse.com/1187671">SUSE bug 1187671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633129" comment="haserl-0.9.36-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633130" comment="haserl is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1863-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009223.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0548-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZLXPXB6GF4EU34RGTCCDHJKHSDEN5AN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5WJLLGD3LSUWRS73C4NPIWYTMST4QO5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W5VF4ZLSQMAQ4QKWGENIWTALPCPOZDSV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1863-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32XRLICOS7YBFMQSQOIJWZLGKXA56ZCP/" source="SUSE-SU"/>
    <description>
    Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136</cve>
	<bugzilla href="https://bugzilla.suse.com/1184147">SUSE bug 1184147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615018" comment="umoci-0.4.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351183" comment="umoci is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615045" comment="cluster-md-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615046" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615047" comment="dlm-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615048" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615049" comment="gfs2-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615050" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614625" comment="kernel-debug-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614626" comment="kernel-debug-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614627" comment="kernel-default-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614628" comment="kernel-default-base-5.3.18-lp152.75.1.lp152.8.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614629" comment="kernel-default-base-rebuild-5.3.18-lp152.75.1.lp152.8.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614630" comment="kernel-default-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614631" comment="kernel-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615051" comment="kernel-devel-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614632" comment="kernel-docs-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614633" comment="kernel-docs-html-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614634" comment="kernel-kvmsmall-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614635" comment="kernel-kvmsmall-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614636" comment="kernel-macros-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614637" comment="kernel-obs-build-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614638" comment="kernel-obs-qa-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614639" comment="kernel-preempt-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614640" comment="kernel-preempt-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615052" comment="kernel-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615053" comment="kernel-rt-devel-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615054" comment="kernel-rt-extra-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615055" comment="kernel-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615056" comment="kernel-rt_debug-devel-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615057" comment="kernel-rt_debug-extra-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614641" comment="kernel-source-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615058" comment="kernel-source-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614642" comment="kernel-source-vanilla-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614643" comment="kernel-syms-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615059" comment="kernel-syms-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615060" comment="kselftests-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615061" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615062" comment="ocfs2-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615063" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615064" comment="reiserfs-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615065" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29157</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29157" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRGETVIUWL6C53ONKOWQB6XMHGC4U2YM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOZSH4SD3B27NBLCL3T2IO4EVB6AMFYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G567PZ5Z5XTMWM5HHQHCWSMCWQSOWCGA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLFYZS4WAYE6TU4PO3V2JUI7DPQEK73I/" source="SUSE-SU"/>
    <description>
    Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157</cve>
	<bugzilla href="https://bugzilla.suse.com/1187418">SUSE bug 1187418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632480" comment="dovecot23-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632481" comment="dovecot23-backend-mysql-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632482" comment="dovecot23-backend-pgsql-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632483" comment="dovecot23-backend-sqlite-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632484" comment="dovecot23-devel-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632485" comment="dovecot23-fts-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632486" comment="dovecot23-fts-lucene-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632487" comment="dovecot23-fts-solr-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632488" comment="dovecot23-fts-squat-2.3.15-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29264</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29265</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29425</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29425" ref_url="https://www.suse.com/security/cve/CVE-2021-29425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIQCDUGRMCM4KVIIQEW45HTWGY6U3D2F/" source="SUSE-SU"/>
    <description>
    In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29425/">CVE-2021-29425</cve>
	<bugzilla href="https://bugzilla.suse.com/1184755">SUSE bug 1184755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614283" comment="apache-commons-io-2.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351800" comment="apache-commons-io is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614284" comment="apache-commons-io-javadoc-2.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351801" comment="apache-commons-io-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29472" ref_url="https://www.suse.com/security/cve/CVE-2021-29472" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ALRJGAG4EXTTIEI2CGMZH3NCUQIQUTQ/" source="SUSE-SU"/>
    <description>
    Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29472/">CVE-2021-29472</cve>
	<bugzilla href="https://bugzilla.suse.com/1185376">SUSE bug 1185376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633742" comment="php-composer-1.10.22-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633743" comment="php-composer is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29477" ref_url="https://www.suse.com/security/cve/CVE-2021-29477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z32YY6DUIFNGIYRC6JPVBZ2WTPYN5SOY/" source="SUSE-SU"/>
    <description>
    Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the `STRALGO LCS` command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29477/">CVE-2021-29477</cve>
	<bugzilla href="https://bugzilla.suse.com/1185729">SUSE bug 1185729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186722">SUSE bug 1186722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614564" comment="redis-6.0.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29478</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29478" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29478" ref_url="https://www.suse.com/security/cve/CVE-2021-29478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z32YY6DUIFNGIYRC6JPVBZ2WTPYN5SOY/" source="SUSE-SU"/>
    <description>
    Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29478/">CVE-2021-29478</cve>
	<bugzilla href="https://bugzilla.suse.com/1185728">SUSE bug 1185728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185730">SUSE bug 1185730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614564" comment="redis-6.0.13-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2CFEJOW6N5BGEB6UU3SEQ3UF5C2UWJL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKAZW7SPSOY6JEPAX2RCIZEGPKTEBUNC/" source="SUSE-SU"/>
    <description>
    XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505</cve>
	<bugzilla href="https://bugzilla.suse.com/1186651">SUSE bug 1186651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615186" comment="xstream-1.4.17-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615187" comment="xstream-benchmark-1.4.17-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615188" comment="xstream-javadoc-1.4.17-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615189" comment="xstream-parent-1.4.17-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29622" ref_url="https://www.suse.com/security/cve/CVE-2021-29622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3KPAMVZLF5BC7A6E5Z2QSNUUFHXGK6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29622/">CVE-2021-29622</cve>
	<bugzilla href="https://bugzilla.suse.com/1186242">SUSE bug 1186242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631120" comment="ansible-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631121" comment="ansible-doc-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631122" comment="ansible-test-2.9.21-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631123" comment="dracut-saltboot-0.1.1627546504.96a0b3e-lp152.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291396" comment="dracut-saltboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631124" comment="golang-github-prometheus-prometheus-2.27.1-lp152.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29650</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615045" comment="cluster-md-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615046" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615047" comment="dlm-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615048" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615049" comment="gfs2-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615050" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614625" comment="kernel-debug-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614626" comment="kernel-debug-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614627" comment="kernel-default-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614628" comment="kernel-default-base-5.3.18-lp152.75.1.lp152.8.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614629" comment="kernel-default-base-rebuild-5.3.18-lp152.75.1.lp152.8.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614630" comment="kernel-default-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614631" comment="kernel-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615051" comment="kernel-devel-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614632" comment="kernel-docs-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614633" comment="kernel-docs-html-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614634" comment="kernel-kvmsmall-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614635" comment="kernel-kvmsmall-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614636" comment="kernel-macros-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614637" comment="kernel-obs-build-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614638" comment="kernel-obs-qa-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614639" comment="kernel-preempt-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614640" comment="kernel-preempt-devel-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615052" comment="kernel-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615053" comment="kernel-rt-devel-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615054" comment="kernel-rt-extra-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615055" comment="kernel-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615056" comment="kernel-rt_debug-devel-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615057" comment="kernel-rt_debug-extra-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614641" comment="kernel-source-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615058" comment="kernel-source-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614642" comment="kernel-source-vanilla-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614643" comment="kernel-syms-5.3.18-lp152.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615059" comment="kernel-syms-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615060" comment="kselftests-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615061" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615062" comment="ocfs2-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615063" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615064" comment="reiserfs-kmp-rt-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615065" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29946</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614314" comment="MozillaFirefox-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614315" comment="MozillaFirefox-branding-upstream-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614316" comment="MozillaFirefox-buildsymbols-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614317" comment="MozillaFirefox-devel-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614318" comment="MozillaFirefox-translations-common-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614319" comment="MozillaFirefox-translations-other-78.10.0-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29948</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file. This vulnerability affects Thunderbird &lt; 78.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614470" comment="MozillaThunderbird-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614471" comment="MozillaThunderbird-translations-common-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614472" comment="MozillaThunderbird-translations-other-78.10.0-lp152.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 78.10.1, Firefox &lt; 87, and Firefox ESR &lt; 78.10.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615031" comment="MozillaFirefox-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615032" comment="MozillaFirefox-branding-upstream-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615033" comment="MozillaFirefox-buildsymbols-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615034" comment="MozillaFirefox-devel-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615035" comment="MozillaFirefox-translations-common-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615036" comment="MozillaFirefox-translations-other-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMW3JK45XDOBEXEJG4EVDNIANAAYG46O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
    <description>
    A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would process incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 78.11, Firefox &lt; 89, and Firefox ESR &lt; 78.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615031" comment="MozillaFirefox-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615032" comment="MozillaFirefox-branding-upstream-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615033" comment="MozillaFirefox-buildsymbols-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615034" comment="MozillaFirefox-devel-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615035" comment="MozillaFirefox-translations-common-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615036" comment="MozillaFirefox-translations-other-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615183" comment="MozillaThunderbird-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615184" comment="MozillaThunderbird-translations-common-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615185" comment="MozillaThunderbird-translations-other-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMW3JK45XDOBEXEJG4EVDNIANAAYG46O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.11, Firefox &lt; 89, and Firefox ESR &lt; 78.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615031" comment="MozillaFirefox-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615032" comment="MozillaFirefox-branding-upstream-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615033" comment="MozillaFirefox-buildsymbols-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615034" comment="MozillaFirefox-devel-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615035" comment="MozillaFirefox-translations-common-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615036" comment="MozillaFirefox-translations-other-78.11.0-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615183" comment="MozillaThunderbird-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615184" comment="MozillaThunderbird-translations-common-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615185" comment="MozillaThunderbird-translations-other-78.11.0-lp152.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29969</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird &lt; 78.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627841" comment="MozillaThunderbird-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627842" comment="MozillaThunderbird-translations-common-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627843" comment="MozillaThunderbird-translations-other-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29970</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625532" comment="MozillaFirefox-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625533" comment="MozillaFirefox-branding-upstream-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625534" comment="MozillaFirefox-buildsymbols-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625535" comment="MozillaFirefox-devel-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625536" comment="MozillaFirefox-translations-common-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625537" comment="MozillaFirefox-translations-other-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627841" comment="MozillaThunderbird-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627842" comment="MozillaThunderbird-translations-common-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627843" comment="MozillaThunderbird-translations-other-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625532" comment="MozillaFirefox-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625533" comment="MozillaFirefox-branding-upstream-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625534" comment="MozillaFirefox-buildsymbols-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625535" comment="MozillaFirefox-devel-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625536" comment="MozillaFirefox-translations-common-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625537" comment="MozillaFirefox-translations-other-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627841" comment="MozillaThunderbird-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627842" comment="MozillaThunderbird-translations-common-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627843" comment="MozillaThunderbird-translations-other-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<bugzilla href="https://bugzilla.suse.com/1189631">SUSE bug 1189631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29982</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<bugzilla href="https://bugzilla.suse.com/1189630">SUSE bug 1189630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29983" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Firefox for Android could get stuck in fullscreen mode and not exit it even after normal interactions that should cause it to exit. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29985</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29986</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    After requesting multiple permissions, and closing the first permission panel, subsequent permission panels will be displayed in a different position but still record a click in the default location, making it possible to trick a user into accepting a permission they did not want to. *This bug only affects Firefox on Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<bugzilla href="https://bugzilla.suse.com/1189629">SUSE bug 1189629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29989</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.13, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631608" comment="MozillaFirefox-buildsymbols-78.13.0-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29990</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29990" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<bugzilla href="https://bugzilla.suse.com/1189628">SUSE bug 1189628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox &lt; 91.0.1 and Thunderbird &lt; 91.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30002</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30004</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0563-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XPNZHCXJ32COQGQ62HNGD6DHPO5E552/" source="SUSE-SU"/>
    <description>
    In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004</cve>
	<bugzilla href="https://bugzilla.suse.com/1184348">SUSE bug 1184348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613975" comment="hostapd-2.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614178" comment="wpa_supplicant-2.9-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614179" comment="wpa_supplicant-gui-2.9-lp152.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30145" ref_url="https://www.suse.com/security/cve/CVE-2021-30145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVXB4F67QODLPKYBZX7SBXTE7ESGKGOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RIJ3BHGUNK7E25ETV52KEDWICBG46XA/" source="SUSE-SU"/>
    <description>
    A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30145/">CVE-2021-30145</cve>
	<bugzilla href="https://bugzilla.suse.com/1186230">SUSE bug 1186230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614755" comment="libmpv1-0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172255" comment="libmpv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614756" comment="mpv-0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172256" comment="mpv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614757" comment="mpv-bash-completion-0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172257" comment="mpv-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614758" comment="mpv-devel-0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172258" comment="mpv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614759" comment="mpv-zsh-completion-0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172259" comment="mpv-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3020" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3020" ref_url="https://www.suse.com/security/cve/CVE-2021-3020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3020/">CVE-2021-3020</cve>
	<bugzilla href="https://bugzilla.suse.com/1180571">SUSE bug 1180571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613692" comment="crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341552" comment="crmsh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613693" comment="crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341553" comment="crmsh-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613694" comment="crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341554" comment="crmsh-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
    <description>
    runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465</cve>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189161">SUSE bug 1189161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30474</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30474" ref_url="https://www.suse.com/security/cve/CVE-2021-30474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2J5LM3YNAORMDABN62AIGQNDBO2GYAF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6VFR2SEGRR5ORYTWSFNBKWUUVDDXFEW/" source="SUSE-SU"/>
    <description>
    aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30474/">CVE-2021-30474</cve>
	<bugzilla href="https://bugzilla.suse.com/1186799">SUSE bug 1186799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652581" comment="aom-tools-1.0.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652582" comment="libaom-devel-1.0.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652583" comment="libaom-devel-doc-1.0.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652584" comment="libaom0-1.0.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652585" comment="libaom0-32bit-1.0.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30475</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30475" ref_url="https://www.suse.com/security/cve/CVE-2021-30475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X2RSNQSM4KBVYVR4O53XXM7IY2AXF6OC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5ED4WHGOYBJI7SG4MTU3KVPDLBCN4U5/" source="SUSE-SU"/>
    <description>
    aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30475/">CVE-2021-30475</cve>
	<bugzilla href="https://bugzilla.suse.com/1189497">SUSE bug 1189497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632802" comment="aom-tools-1.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261711" comment="aom-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632803" comment="libaom-devel-1.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261713" comment="libaom-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632804" comment="libaom-devel-doc-1.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261714" comment="libaom-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632805" comment="libaom0-1.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261715" comment="libaom0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632806" comment="libaom0-32bit-1.0.0-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632651" comment="libaom0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30485</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30506" ref_url="https://www.suse.com/security/cve/CVE-2021-30506" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Web App Installs in Google Chrome on Android prior to 90.0.4430.212 allowed an attacker who convinced a user to install a web application to inject scripts or HTML into a privileged page via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30506/">CVE-2021-30506</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30507" ref_url="https://www.suse.com/security/cve/CVE-2021-30507" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Offline in Google Chrome on Android prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30507/">CVE-2021-30507</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30508</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30508" ref_url="https://www.suse.com/security/cve/CVE-2021-30508" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Media Feeds in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to enable certain features in Chrome to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30508/">CVE-2021-30508</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30509" ref_url="https://www.suse.com/security/cve/CVE-2021-30509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page and a crafted Chrome extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30509/">CVE-2021-30509</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30510</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30510" ref_url="https://www.suse.com/security/cve/CVE-2021-30510" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Aura in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30510/">CVE-2021-30510</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30511" ref_url="https://www.suse.com/security/cve/CVE-2021-30511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds read in Tab Groups in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30511/">CVE-2021-30511</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30512" ref_url="https://www.suse.com/security/cve/CVE-2021-30512" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30512/">CVE-2021-30512</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30513</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30513" ref_url="https://www.suse.com/security/cve/CVE-2021-30513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30513/">CVE-2021-30513</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30514</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30514" ref_url="https://www.suse.com/security/cve/CVE-2021-30514" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Autofill in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30514/">CVE-2021-30514</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30515" ref_url="https://www.suse.com/security/cve/CVE-2021-30515" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in File API in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30515/">CVE-2021-30515</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30516" ref_url="https://www.suse.com/security/cve/CVE-2021-30516" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in History in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30516/">CVE-2021-30516</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30517" ref_url="https://www.suse.com/security/cve/CVE-2021-30517" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30517/">CVE-2021-30517</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30518" ref_url="https://www.suse.com/security/cve/CVE-2021-30518" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Reader Mode in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30518/">CVE-2021-30518</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30519</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30519" ref_url="https://www.suse.com/security/cve/CVE-2021-30519" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Payments in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious payments app to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30519/">CVE-2021-30519</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30520</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30520" ref_url="https://www.suse.com/security/cve/CVE-2021-30520" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N343FIVEUFRWGMSE6EP3FRKNIN6RA6VT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXXTVK5FWZGMVLWH6O7ONOFANNOOJNWS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMLE6Y32Y2DK2ZVCT4O73EKD4VH7BGEG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30520/">CVE-2021-30520</cve>
	<bugzilla href="https://bugzilla.suse.com/1185908">SUSE bug 1185908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614934" comment="opera-76.0.4017.154-lp152.2.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614729" comment="chromedriver-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614730" comment="chromium-90.0.4430.212-lp152.2.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30521" ref_url="https://www.suse.com/security/cve/CVE-2021-30521" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Autofill in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30521/">CVE-2021-30521</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30522" ref_url="https://www.suse.com/security/cve/CVE-2021-30522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30522/">CVE-2021-30522</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30523" ref_url="https://www.suse.com/security/cve/CVE-2021-30523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30523/">CVE-2021-30523</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30524" ref_url="https://www.suse.com/security/cve/CVE-2021-30524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30524/">CVE-2021-30524</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30525" ref_url="https://www.suse.com/security/cve/CVE-2021-30525" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in TabGroups in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30525/">CVE-2021-30525</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30526" ref_url="https://www.suse.com/security/cve/CVE-2021-30526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Out of bounds write in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30526/">CVE-2021-30526</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30527" ref_url="https://www.suse.com/security/cve/CVE-2021-30527" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in WebUI in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30527/">CVE-2021-30527</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30528" ref_url="https://www.suse.com/security/cve/CVE-2021-30528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in WebAuthentication in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker who had compromised the renderer process of a user who had saved a credit card in their Google account to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30528/">CVE-2021-30528</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30529" ref_url="https://www.suse.com/security/cve/CVE-2021-30529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30529/">CVE-2021-30529</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30530</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30530" ref_url="https://www.suse.com/security/cve/CVE-2021-30530" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30530/">CVE-2021-30530</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30531" ref_url="https://www.suse.com/security/cve/CVE-2021-30531" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30531/">CVE-2021-30531</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30532" ref_url="https://www.suse.com/security/cve/CVE-2021-30532" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30532/">CVE-2021-30532</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30533" ref_url="https://www.suse.com/security/cve/CVE-2021-30533" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30533/">CVE-2021-30533</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30534" ref_url="https://www.suse.com/security/cve/CVE-2021-30534" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in iFrameSandbox in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30534/">CVE-2021-30534</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30535" ref_url="https://www.suse.com/security/cve/CVE-2021-30535" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30535/">CVE-2021-30535</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30536" ref_url="https://www.suse.com/security/cve/CVE-2021-30536" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Out of bounds read in V8 in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30536/">CVE-2021-30536</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30537" ref_url="https://www.suse.com/security/cve/CVE-2021-30537" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in cookies in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass cookie policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30537/">CVE-2021-30537</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30538" ref_url="https://www.suse.com/security/cve/CVE-2021-30538" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30538/">CVE-2021-30538</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30539" ref_url="https://www.suse.com/security/cve/CVE-2021-30539" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30539/">CVE-2021-30539</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30540" ref_url="https://www.suse.com/security/cve/CVE-2021-30540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJJHCREERF6N3XLSWRNBLKZ4TY5THPTY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in payments in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30540/">CVE-2021-30540</cve>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614932" comment="chromedriver-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614933" comment="chromium-91.0.4472.77-lp152.2.98.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in BFCache in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30545" ref_url="https://www.suse.com/security/cve/CVE-2021-30545" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30545/">CVE-2021-30545</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30546</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30546" ref_url="https://www.suse.com/security/cve/CVE-2021-30546" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30546/">CVE-2021-30546</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30547</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625532" comment="MozillaFirefox-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625533" comment="MozillaFirefox-branding-upstream-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625534" comment="MozillaFirefox-buildsymbols-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625535" comment="MozillaFirefox-devel-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625536" comment="MozillaFirefox-translations-common-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625537" comment="MozillaFirefox-translations-other-78.12.0-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627841" comment="MozillaThunderbird-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627842" comment="MozillaThunderbird-translations-common-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009627843" comment="MozillaThunderbird-translations-other-78.12.0-lp152.2.48.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30548" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Loader in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30549</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30549" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30549" ref_url="https://www.suse.com/security/cve/CVE-2021-30549" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30549/">CVE-2021-30549</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30550</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30550" ref_url="https://www.suse.com/security/cve/CVE-2021-30550" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30550/">CVE-2021-30550</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30552</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30552" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30552" ref_url="https://www.suse.com/security/cve/CVE-2021-30552" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30552/">CVE-2021-30552</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30553" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615081" comment="chromedriver-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615082" comment="chromium-91.0.4472.101-lp152.2.104.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30554</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30554" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRQS6E56EGURN6VSX6LRCTP5WHICGNXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554</cve>
	<bugzilla href="https://bugzilla.suse.com/1187481">SUSE bug 1187481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615126" comment="chromedriver-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615127" comment="chromium-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30555" ref_url="https://www.suse.com/security/cve/CVE-2021-30555" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRQS6E56EGURN6VSX6LRCTP5WHICGNXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30555/">CVE-2021-30555</cve>
	<bugzilla href="https://bugzilla.suse.com/1187481">SUSE bug 1187481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615126" comment="chromedriver-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615127" comment="chromium-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRQS6E56EGURN6VSX6LRCTP5WHICGNXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556</cve>
	<bugzilla href="https://bugzilla.suse.com/1187481">SUSE bug 1187481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615126" comment="chromedriver-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615127" comment="chromium-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30557</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30557" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30557" ref_url="https://www.suse.com/security/cve/CVE-2021-30557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRQS6E56EGURN6VSX6LRCTP5WHICGNXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30557/">CVE-2021-30557</cve>
	<bugzilla href="https://bugzilla.suse.com/1187481">SUSE bug 1187481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624113" comment="opera-77.0.4054.146-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615126" comment="chromedriver-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615127" comment="chromium-91.0.4472.114-lp152.2.107.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30559" ref_url="https://www.suse.com/security/cve/CVE-2021-30559" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
    <description>
    Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30559/">CVE-2021-30559</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30561" ref_url="https://www.suse.com/security/cve/CVE-2021-30561" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30561/">CVE-2021-30561</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30562" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30562" ref_url="https://www.suse.com/security/cve/CVE-2021-30562" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30562/">CVE-2021-30562</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30563" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30564</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30564" ref_url="https://www.suse.com/security/cve/CVE-2021-30564" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ7H7GF4VL5FVVVYDBRQ4WEQNAFKJKEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEADDZG3IJDGTQJEBACMOO23GKW2OSHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30564/">CVE-2021-30564</cve>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009628182" comment="opera-77.0.4054.277-lp152.2.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626202" comment="chromedriver-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626203" comment="chromium-91.0.4472.164-lp152.2.113.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30565" ref_url="https://www.suse.com/security/cve/CVE-2021-30565" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30565/">CVE-2021-30565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30566" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30566" ref_url="https://www.suse.com/security/cve/CVE-2021-30566" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30566/">CVE-2021-30566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30567" ref_url="https://www.suse.com/security/cve/CVE-2021-30567" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30567/">CVE-2021-30567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30568" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30568" ref_url="https://www.suse.com/security/cve/CVE-2021-30568" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30568/">CVE-2021-30568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30569" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30569" ref_url="https://www.suse.com/security/cve/CVE-2021-30569" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30569/">CVE-2021-30569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30571" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30571" ref_url="https://www.suse.com/security/cve/CVE-2021-30571" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30571/">CVE-2021-30571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30572</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30572" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30572" ref_url="https://www.suse.com/security/cve/CVE-2021-30572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30572/">CVE-2021-30572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30573" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30573" ref_url="https://www.suse.com/security/cve/CVE-2021-30573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30573/">CVE-2021-30573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30574" ref_url="https://www.suse.com/security/cve/CVE-2021-30574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30574/">CVE-2021-30574</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30575" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30575" ref_url="https://www.suse.com/security/cve/CVE-2021-30575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30575/">CVE-2021-30575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30576</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30576" ref_url="https://www.suse.com/security/cve/CVE-2021-30576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30576/">CVE-2021-30576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30577" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30577" ref_url="https://www.suse.com/security/cve/CVE-2021-30577" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30577/">CVE-2021-30577</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30578" ref_url="https://www.suse.com/security/cve/CVE-2021-30578" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30578/">CVE-2021-30578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30579</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30579" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30579" ref_url="https://www.suse.com/security/cve/CVE-2021-30579" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30579/">CVE-2021-30579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30581</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30581" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30581" ref_url="https://www.suse.com/security/cve/CVE-2021-30581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30581/">CVE-2021-30581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30582</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30582" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30582" ref_url="https://www.suse.com/security/cve/CVE-2021-30582" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30582/">CVE-2021-30582</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30584" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30584" ref_url="https://www.suse.com/security/cve/CVE-2021-30584" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30584/">CVE-2021-30584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30585</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30585" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30585" ref_url="https://www.suse.com/security/cve/CVE-2021-30585" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30585/">CVE-2021-30585</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30588</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30588" ref_url="https://www.suse.com/security/cve/CVE-2021-30588" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-30588/">CVE-2021-30588</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30589</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30589" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30589" ref_url="https://www.suse.com/security/cve/CVE-2021-30589" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30589/">CVE-2021-30589</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30590</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30590" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30590" ref_url="https://www.suse.com/security/cve/CVE-2021-30590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30590/">CVE-2021-30590</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30591</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30591" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30591" ref_url="https://www.suse.com/security/cve/CVE-2021-30591" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30591/">CVE-2021-30591</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30592" ref_url="https://www.suse.com/security/cve/CVE-2021-30592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30592/">CVE-2021-30592</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30593" ref_url="https://www.suse.com/security/cve/CVE-2021-30593" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30593/">CVE-2021-30593</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30594" ref_url="https://www.suse.com/security/cve/CVE-2021-30594" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30594/">CVE-2021-30594</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30596</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30596" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30596" ref_url="https://www.suse.com/security/cve/CVE-2021-30596" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30596/">CVE-2021-30596</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30597</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30597" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30597" ref_url="https://www.suse.com/security/cve/CVE-2021-30597" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30597/">CVE-2021-30597</cve>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632013" comment="opera-78.0.4093.147-lp152.2.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630522" comment="chromedriver-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630523" comment="chromium-92.0.4515.131-lp152.2.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30599" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30600</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30600" ref_url="https://www.suse.com/security/cve/CVE-2021-30600" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30600/">CVE-2021-30600</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30601</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30601" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30601" ref_url="https://www.suse.com/security/cve/CVE-2021-30601" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30601/">CVE-2021-30601</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30602</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30602" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30603</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30604</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30604" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6WKS2BLZ2TY63ZSCC2NAODDOSDSPKTN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604</cve>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632479" comment="opera-78.0.4093.184-lp152.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631504" comment="chromedriver-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631505" comment="chromium-92.0.4515.159-lp152.2.122.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30606</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30606" ref_url="https://www.suse.com/security/cve/CVE-2021-30606" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30606 Use after free in Blink
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30606/">CVE-2021-30606</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30607" ref_url="https://www.suse.com/security/cve/CVE-2021-30607" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30607 Use after free in Permissions
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30607/">CVE-2021-30607</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30608" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30608" ref_url="https://www.suse.com/security/cve/CVE-2021-30608" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30608 Use after free in Web Share
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30608/">CVE-2021-30608</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30609" ref_url="https://www.suse.com/security/cve/CVE-2021-30609" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30609 Use after free in Sign-In
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30609/">CVE-2021-30609</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30610</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30610" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30610" ref_url="https://www.suse.com/security/cve/CVE-2021-30610" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30610 Use after free in Extensions API
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30610/">CVE-2021-30610</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30611</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30611" ref_url="https://www.suse.com/security/cve/CVE-2021-30611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30611 Use after free in WebRTC
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30611/">CVE-2021-30611</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30612</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30612" ref_url="https://www.suse.com/security/cve/CVE-2021-30612" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30612 Use after free in WebRTC
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30612/">CVE-2021-30612</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30613" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30613 Use after free in Base internals
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30614" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30614" ref_url="https://www.suse.com/security/cve/CVE-2021-30614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30614/">CVE-2021-30614</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30615</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30615" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30615" ref_url="https://www.suse.com/security/cve/CVE-2021-30615" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30615 Cross-origin data leak in Navigation
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30615/">CVE-2021-30615</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30616" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30616 Use after free in Media
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30617</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30617" ref_url="https://www.suse.com/security/cve/CVE-2021-30617" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30617 Policy bypass in Blink
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30617/">CVE-2021-30617</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30618 Inappropriate implementation in DevTools
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30619" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30619" ref_url="https://www.suse.com/security/cve/CVE-2021-30619" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30619 UI Spoofing in Autofill
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30619/">CVE-2021-30619</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30620</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30620" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30620" ref_url="https://www.suse.com/security/cve/CVE-2021-30620" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30620/">CVE-2021-30620</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30621" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30621" ref_url="https://www.suse.com/security/cve/CVE-2021-30621" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30621 UI Spoofing in Autofill
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30621/">CVE-2021-30621</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30622" ref_url="https://www.suse.com/security/cve/CVE-2021-30622" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30622 Use after free in WebApp Installs
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30622/">CVE-2021-30622</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30623" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30623" ref_url="https://www.suse.com/security/cve/CVE-2021-30623" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30623 Use after free in Bookmarks
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30623/">CVE-2021-30623</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30624" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30624" ref_url="https://www.suse.com/security/cve/CVE-2021-30624" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Chromium: CVE-2021-30624 Use after free in Autofill
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30624/">CVE-2021-30624</cve>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634042" comment="opera-79.0.4143.22-lp152.2.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30625" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30626</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30626" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30627</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30627" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30628</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30628" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30629</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30629" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30630</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30630" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30631</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30632</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30632" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30633</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30633" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKFA6UOYGKCDBHHUW6MA56YT5KIDLCNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633</cve>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651178" comment="opera-79.0.4143.50-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633875" comment="chromedriver-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633876" comment="chromium-93.0.4577.82-lp152.2.125.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KJLIWWFI3SIH2EDCVQ6J6NITH5JTGPE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JSV3IQW2IZ4TG73GE2HYEJN52YYLT3T/" source="SUSE-SU"/>
    <description>
    A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640</cve>
	<bugzilla href="https://bugzilla.suse.com/1188279">SUSE bug 1188279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657141" comment="tomcat-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657142" comment="tomcat-admin-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657143" comment="tomcat-docs-webapp-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657144" comment="tomcat-el-3_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657145" comment="tomcat-embed-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657146" comment="tomcat-javadoc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657147" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657148" comment="tomcat-jsvc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657149" comment="tomcat-lib-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657150" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657151" comment="tomcat-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30665</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30689</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30734</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30744</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30795</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629510" comment="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629511" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629512" comment="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629513" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629514" comment="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629515" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629516" comment="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629517" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629518" comment="webkit-jsc-4-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629519" comment="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629520" comment="webkit2gtk3-devel-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629521" comment="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPGRR75P2BX5LLODQ77IAFNLCV2CKB4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTYOXRXVCTEGNIBJB3F6WZPD4CNOQI7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659482" comment="libjavascriptcoregtk-4_0-18-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659483" comment="libwebkit2gtk-4_0-37-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659484" comment="libwebkit2gtk3-lang-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659485" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659486" comment="typelib-1_0-WebKit2-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659487" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659488" comment="webkit-jsc-4-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659489" comment="webkit2gtk-4_0-injected-bundles-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659490" comment="webkit2gtk3-devel-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659491" comment="webkit2gtk3-minibrowser-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30851</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPGRR75P2BX5LLODQ77IAFNLCV2CKB4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTYOXRXVCTEGNIBJB3F6WZPD4CNOQI7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659482" comment="libjavascriptcoregtk-4_0-18-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659483" comment="libwebkit2gtk-4_0-37-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659484" comment="libwebkit2gtk3-lang-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659485" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659486" comment="typelib-1_0-WebKit2-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659487" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659488" comment="webkit-jsc-4-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659489" comment="webkit2gtk-4_0-injected-bundles-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659490" comment="webkit2gtk3-devel-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659491" comment="webkit2gtk3-minibrowser-2.34.1-lp152.2.25.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191298">SUSE bug 1191298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191301">SUSE bug 1191301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652648" comment="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652649" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652650" comment="libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652651" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652652" comment="libwebkit2gtk3-lang-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652653" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652654" comment="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652655" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652656" comment="webkit-jsc-4-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652657" comment="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652658" comment="webkit2gtk3-devel-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652659" comment="webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6AHVSSFZQ2VAOK2PGQ7E4WNIXZEO6OV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JVN2JM5TB7JXDFH25XPTVDVURPTQ3WB/" source="SUSE-SU"/>
    <description>
    In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114</cve>
	<bugzilla href="https://bugzilla.suse.com/1181145">SUSE bug 1181145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612991" comment="go1.14-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612992" comment="go1.14-doc-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612993" comment="go1.14-race-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612988" comment="go1.15-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612989" comment="go1.15-doc-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612990" comment="go1.15-race-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6AHVSSFZQ2VAOK2PGQ7E4WNIXZEO6OV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JVN2JM5TB7JXDFH25XPTVDVURPTQ3WB/" source="SUSE-SU"/>
    <description>
    Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/1181146">SUSE bug 1181146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612991" comment="go1.14-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612992" comment="go1.14-doc-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612993" comment="go1.14-race-1.14.14-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612988" comment="go1.15-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612989" comment="go1.15-doc-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612990" comment="go1.15-race-1.15.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31215" ref_url="https://www.suse.com/security/cve/CVE-2021-31215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1856-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQZ3XESX2ESDFJO4Y7ZLU4AIJYQKBO4W/" source="SUSE-SU"/>
    <description>
    SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-31215/">CVE-2021-31215</cve>
	<bugzilla href="https://bugzilla.suse.com/1186024">SUSE bug 1186024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614804" comment="libnss_slurm2-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300283" comment="libnss_slurm2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614805" comment="libpmi0-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614806" comment="libslurm35-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300284" comment="libslurm35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614807" comment="perl-slurm-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614808" comment="slurm-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614809" comment="slurm-auth-none-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614810" comment="slurm-config-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614811" comment="slurm-config-man-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614812" comment="slurm-cray-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614813" comment="slurm-devel-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614814" comment="slurm-doc-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614815" comment="slurm-hdf5-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614816" comment="slurm-lua-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614817" comment="slurm-munge-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614818" comment="slurm-node-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614819" comment="slurm-openlava-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614820" comment="slurm-pam_slurm-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614821" comment="slurm-plugins-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614822" comment="slurm-rest-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300285" comment="slurm-rest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614823" comment="slurm-seff-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614824" comment="slurm-sjstat-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614825" comment="slurm-slurmdbd-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614826" comment="slurm-sql-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614827" comment="slurm-sview-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614828" comment="slurm-torque-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614829" comment="slurm-webdoc-20.02.7-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3139" ref_url="https://www.suse.com/security/cve/CVE-2021-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTFH53IA4W7XVWYIQM4NLLAGVV2F4GXC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYQLRIH544YEAMHU4GAXRYAFN2OW7FVX/" source="SUSE-SU"/>
    <description>
    In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-3139/">CVE-2021-3139</cve>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615248" comment="libtcmu2-1.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342056" comment="libtcmu2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615249" comment="tcmu-runner-1.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342057" comment="tcmu-runner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615250" comment="tcmu-runner-handler-rbd-1.5.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342058" comment="tcmu-runner-handler-rbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3144</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3148</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31525" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0904-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEBF3TK6RJGTIEOIZ3AQJ3GEDOBRMLER/" source="SUSE-SU"/>
    <description>
    net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525</cve>
	<bugzilla href="https://bugzilla.suse.com/1185790">SUSE bug 1185790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615147" comment="go1.15-1.15.12-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615148" comment="go1.15-doc-1.15.12-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615149" comment="go1.15-race-1.15.12-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IHKZVFIFHF623NYTHXHM7GHY5WE7LCHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WUBWGS6GPACWAIGOVLE7UDHZ4HSXZVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TE4MZKP3FOYVRFOKL6QQUC77PHP2K76/" source="SUSE-SU"/>
    <description>
    LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191879">SUSE bug 1191879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615024" comment="libX11-6-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615025" comment="libX11-6-32bit-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615026" comment="libX11-data-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615027" comment="libX11-devel-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615028" comment="libX11-devel-32bit-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615029" comment="libX11-xcb1-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615030" comment="libX11-xcb1-32bit-1.6.5-lp152.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3156</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<reference ref_id="TID000019841" ref_url="https://www.suse.com/support/kb/doc/?id=000019841" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTRDPRKO2NDRVSH5UJJKLBDYJXGUBK6P/" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181506">SUSE bug 1181506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181657">SUSE bug 1181657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614280" comment="sudo-1.8.22-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614281" comment="sudo-devel-1.8.22-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614282" comment="sudo-test-1.8.22-lp152.8.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009811.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3FNQWDRSXZ7B45EGNO2YK4R6EGOPYN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658408" comment="libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658443" comment="libnetcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658409" comment="libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658444" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658410" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658445" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658411" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658446" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658412" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658447" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658413" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658256" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658414" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658257" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658415" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658258" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658416" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658259" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658417" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658260" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658418" comment="netcdf-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658448" comment="netcdf-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658419" comment="netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658449" comment="netcdf-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658420" comment="netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658450" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658421" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658451" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658422" comment="netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658452" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658423" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658453" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658424" comment="netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658454" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658425" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658455" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658426" comment="netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658456" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658427" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658457" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658428" comment="netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658265" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658429" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658266" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658430" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658267" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658431" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658268" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658432" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658269" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658433" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658270" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658434" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658271" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658435" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658272" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658436" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658273" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658437" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658274" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658438" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658275" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658439" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658276" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658440" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658277" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658441" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658278" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009658442" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009658279" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1951-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSSCTPCNB3RDCWJ6DOALIIRKDXUAVGPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615128" comment="python3-salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615129" comment="salt-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615130" comment="salt-api-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615131" comment="salt-bash-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615132" comment="salt-cloud-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615133" comment="salt-doc-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615134" comment="salt-fish-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615135" comment="salt-master-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615136" comment="salt-minion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615137" comment="salt-proxy-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615138" comment="salt-ssh-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615139" comment="salt-standalone-formulas-configuration-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615140" comment="salt-syndic-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615141" comment="salt-transactional-update-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615142" comment="salt-zsh-completion-3002.2-lp152.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615158" comment="apache2-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615159" comment="apache2-devel-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615160" comment="apache2-doc-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615161" comment="apache2-event-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615162" comment="apache2-example-pages-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615163" comment="apache2-prefork-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615164" comment="apache2-utils-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615165" comment="apache2-worker-2.4.43-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613120" comment="libpython2_7-1_0-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613121" comment="libpython2_7-1_0-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613264" comment="libpython3_6m1_0-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613265" comment="libpython3_6m1_0-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613122" comment="python-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613123" comment="python-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613124" comment="python-base-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613125" comment="python-base-32bit-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613126" comment="python-curses-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613127" comment="python-demo-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613128" comment="python-devel-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613129" comment="python-doc-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613130" comment="python-doc-pdf-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613131" comment="python-gdbm-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613132" comment="python-idle-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613133" comment="python-tk-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613134" comment="python-xml-2.7.17-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613266" comment="python3-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613267" comment="python3-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613268" comment="python3-base-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613269" comment="python3-base-32bit-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613270" comment="python3-curses-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613271" comment="python3-dbm-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613272" comment="python3-devel-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613273" comment="python3-doc-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613274" comment="python3-doc-devhelp-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613275" comment="python3-idle-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613276" comment="python3-testsuite-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613277" comment="python3-tk-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613278" comment="python3-tools-3.6.12-lp152.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659192" comment="libruby2_5-2_5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659193" comment="ruby2.5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659194" comment="ruby2.5-devel-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659195" comment="ruby2.5-devel-extra-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659196" comment="ruby2.5-doc-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659197" comment="ruby2.5-doc-ri-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659198" comment="ruby2.5-stdlib-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31806" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806" source="SUSE CVE"/>
		<reference ref_id="GHSA-pxwq-f3qr-w2xf" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-pxwq-f3qr-w2xf" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806</cve>
	<bugzilla href="https://bugzilla.suse.com/1185916">SUSE bug 1185916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615080" comment="squid-4.15-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3181</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEMZ6Y2RB5555R7MDMITJLHGYX4T65C7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXFLXGSUQPBN7TELGSNJZPFUX7KMTSBT/" source="SUSE-SU"/>
    <description>
    rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181</cve>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612968" comment="mutt-1.10.1-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612969" comment="mutt-doc-1.10.1-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009612970" comment="mutt-lang-1.10.1-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193383">SUSE bug 1193383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659192" comment="libruby2_5-2_5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659193" comment="ruby2.5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659194" comment="ruby2.5-devel-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659195" comment="ruby2.5-devel-extra-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659196" comment="ruby2.5-doc-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659197" comment="ruby2.5-doc-ri-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659198" comment="ruby2.5-stdlib-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUD7F7CVHXB4OCLI7OT4AVJTO6T64TM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2UD46YGBOYO64SOPMOM6DQAL6FGCHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DDS7NLC6D7UVP25OVRWIRK6Y44WZKCU/" source="SUSE-SU"/>
    <description>
    A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614830" comment="gstreamer-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154019" comment="gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614831" comment="gstreamer-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154020" comment="gstreamer-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614832" comment="gstreamer-devel-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154021" comment="gstreamer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614833" comment="gstreamer-doc-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154022" comment="gstreamer-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614834" comment="gstreamer-lang-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154023" comment="gstreamer-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614835" comment="gstreamer-plugins-bad-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614836" comment="gstreamer-plugins-bad-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614837" comment="gstreamer-plugins-bad-chromaprint-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476859" comment="gstreamer-plugins-bad-chromaprint is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614838" comment="gstreamer-plugins-bad-chromaprint-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476860" comment="gstreamer-plugins-bad-chromaprint-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614839" comment="gstreamer-plugins-bad-devel-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614840" comment="gstreamer-plugins-bad-doc-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614841" comment="gstreamer-plugins-bad-fluidsynth-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476861" comment="gstreamer-plugins-bad-fluidsynth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614842" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476862" comment="gstreamer-plugins-bad-fluidsynth-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614843" comment="gstreamer-plugins-bad-lang-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614844" comment="gstreamer-plugins-base-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614845" comment="gstreamer-plugins-base-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614846" comment="gstreamer-plugins-base-devel-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614847" comment="gstreamer-plugins-base-devel-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154283" comment="gstreamer-plugins-base-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614848" comment="gstreamer-plugins-base-doc-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614849" comment="gstreamer-plugins-base-lang-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614850" comment="gstreamer-plugins-good-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614851" comment="gstreamer-plugins-good-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614852" comment="gstreamer-plugins-good-doc-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614853" comment="gstreamer-plugins-good-extra-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614854" comment="gstreamer-plugins-good-extra-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614855" comment="gstreamer-plugins-good-gtk-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476863" comment="gstreamer-plugins-good-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614856" comment="gstreamer-plugins-good-jack-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476864" comment="gstreamer-plugins-good-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614857" comment="gstreamer-plugins-good-jack-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476865" comment="gstreamer-plugins-good-jack-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614858" comment="gstreamer-plugins-good-lang-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614859" comment="gstreamer-plugins-good-qtqml-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476866" comment="gstreamer-plugins-good-qtqml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614860" comment="gstreamer-plugins-ugly-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177245" comment="gstreamer-plugins-ugly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614861" comment="gstreamer-plugins-ugly-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476867" comment="gstreamer-plugins-ugly-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614862" comment="gstreamer-plugins-ugly-doc-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476868" comment="gstreamer-plugins-ugly-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614863" comment="gstreamer-plugins-ugly-lang-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177246" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614864" comment="gstreamer-utils-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154024" comment="gstreamer-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614865" comment="libgstadaptivedemux-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154275" comment="libgstadaptivedemux-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614866" comment="libgstadaptivedemux-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154276" comment="libgstadaptivedemux-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614867" comment="libgstallocators-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614868" comment="libgstallocators-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614869" comment="libgstapp-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614870" comment="libgstapp-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614871" comment="libgstaudio-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614872" comment="libgstaudio-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614873" comment="libgstbadaudio-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154277" comment="libgstbadaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614874" comment="libgstbadaudio-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154278" comment="libgstbadaudio-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614875" comment="libgstbasecamerabinsrc-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614876" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614877" comment="libgstcodecparsers-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614878" comment="libgstcodecparsers-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614879" comment="libgstfft-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614880" comment="libgstfft-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614881" comment="libgstgl-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614882" comment="libgstgl-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614883" comment="libgstinsertbin-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614884" comment="libgstinsertbin-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614885" comment="libgstisoff-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476869" comment="libgstisoff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614886" comment="libgstisoff-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476870" comment="libgstisoff-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614887" comment="libgstmpegts-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614888" comment="libgstmpegts-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614889" comment="libgstpbutils-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614890" comment="libgstpbutils-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614891" comment="libgstphotography-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614892" comment="libgstphotography-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614893" comment="libgstplayer-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154279" comment="libgstplayer-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614894" comment="libgstplayer-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154280" comment="libgstplayer-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614895" comment="libgstreamer-1_0-0-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154025" comment="libgstreamer-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614896" comment="libgstreamer-1_0-0-32bit-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154026" comment="libgstreamer-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614897" comment="libgstriff-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614898" comment="libgstriff-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614899" comment="libgstrtp-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614900" comment="libgstrtp-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614901" comment="libgstrtsp-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614902" comment="libgstrtsp-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614903" comment="libgstsctp-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476871" comment="libgstsctp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614904" comment="libgstsctp-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476872" comment="libgstsctp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614905" comment="libgstsdp-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614906" comment="libgstsdp-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614907" comment="libgsttag-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614908" comment="libgsttag-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614909" comment="libgsturidownloader-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614910" comment="libgsturidownloader-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614911" comment="libgstvideo-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614912" comment="libgstvideo-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614913" comment="libgstwayland-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614914" comment="libgstwayland-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614915" comment="libgstwebrtc-1_0-0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476873" comment="libgstwebrtc-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614916" comment="libgstwebrtc-1_0-0-32bit-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476874" comment="libgstwebrtc-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614917" comment="typelib-1_0-Gst-1_0-1.16.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154027" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614918" comment="typelib-1_0-GstAllocators-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614919" comment="typelib-1_0-GstApp-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614920" comment="typelib-1_0-GstAudio-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614921" comment="typelib-1_0-GstGL-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476875" comment="typelib-1_0-GstGL-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614922" comment="typelib-1_0-GstInsertBin-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476876" comment="typelib-1_0-GstInsertBin-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614923" comment="typelib-1_0-GstMpegts-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476877" comment="typelib-1_0-GstMpegts-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614924" comment="typelib-1_0-GstPbutils-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614925" comment="typelib-1_0-GstPlayer-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476878" comment="typelib-1_0-GstPlayer-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614926" comment="typelib-1_0-GstRtp-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614927" comment="typelib-1_0-GstRtsp-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614928" comment="typelib-1_0-GstSdp-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614929" comment="typelib-1_0-GstTag-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614930" comment="typelib-1_0-GstVideo-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614931" comment="typelib-1_0-GstWebRTC-1_0-1.16.3-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476879" comment="typelib-1_0-GstWebRTC-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31916</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613306" comment="python2-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613307" comment="python3-salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613308" comment="salt-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613309" comment="salt-api-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613310" comment="salt-bash-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613311" comment="salt-cloud-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613312" comment="salt-doc-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613313" comment="salt-fish-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613314" comment="salt-master-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613315" comment="salt-minion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613316" comment="salt-proxy-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613317" comment="salt-ssh-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613318" comment="salt-standalone-formulas-configuration-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613319" comment="salt-syndic-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613320" comment="salt-zsh-completion-3000-lp152.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31998</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7WPHWRLIUN6FJFWJTZWJNHGURPDXI3KU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L66SY5KJMRBUJVLIGSLIQAWIALH62ZA2/" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of inn of SUSE Linux Enterprise Server 11-SP3; openSUSE Backports SLE-15-SP2, openSUSE Leap 15.2 allows local attackers to escalate their privileges from the news user to root. This issue affects: SUSE Linux Enterprise Server 11-SP3 inn version inn-2.4.2-170.21.3.1 and prior versions. openSUSE Backports SLE-15-SP2 inn versions prior to 2.6.2. openSUSE Leap 15.2 inn versions prior to 2.6.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189836">SUSE bug 1189836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614935" comment="inn-2.6.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278741" comment="inn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614936" comment="inn-devel-2.6.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278742" comment="inn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614937" comment="mininews-2.6.2-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278743" comment="mininews is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32027</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
    <description>
    A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615117" comment="postgresql10-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615118" comment="postgresql10-contrib-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615119" comment="postgresql10-devel-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615120" comment="postgresql10-docs-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615121" comment="postgresql10-plperl-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615122" comment="postgresql10-plpython-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615123" comment="postgresql10-pltcl-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615124" comment="postgresql10-server-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615125" comment="postgresql10-test-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32028</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
    <description>
    A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615117" comment="postgresql10-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615118" comment="postgresql10-contrib-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615119" comment="postgresql10-devel-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615120" comment="postgresql10-docs-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615121" comment="postgresql10-plperl-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615122" comment="postgresql10-plpython-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615123" comment="postgresql10-pltcl-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615124" comment="postgresql10-server-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615125" comment="postgresql10-test-10.17-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32066</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659192" comment="libruby2_5-2_5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659193" comment="ruby2.5-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659194" comment="ruby2.5-devel-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659195" comment="ruby2.5-devel-extra-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659196" comment="ruby2.5-doc-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659197" comment="ruby2.5-doc-ri-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659198" comment="ruby2.5-stdlib-2.5.9-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32280</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32280" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653903" comment="transfig-3.2.8b-lp152.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3246</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631327" comment="libsndfile-devel-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631328" comment="libsndfile-progs-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631329" comment="libsndfile1-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631330" comment="libsndfile1-32bit-1.0.28-lp152.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490</cve>
	<bugzilla href="https://bugzilla.suse.com/1185895">SUSE bug 1185895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614721" comment="djvulibre-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614722" comment="djvulibre-doc-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614723" comment="libdjvulibre-devel-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614724" comment="libdjvulibre21-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32491</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614721" comment="djvulibre-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614722" comment="djvulibre-doc-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614723" comment="libdjvulibre-devel-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614724" comment="libdjvulibre21-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32492</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614721" comment="djvulibre-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614722" comment="djvulibre-doc-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614723" comment="libdjvulibre-devel-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614724" comment="libdjvulibre21-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32493</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614721" comment="djvulibre-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614722" comment="djvulibre-doc-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614723" comment="libdjvulibre-devel-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614724" comment="libdjvulibre21-3.5.27-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32625" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32625" ref_url="https://www.suse.com/security/cve/CVE-2021-32625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B74HW6HBAH5TAP4L5LLUY3KI4JBTVQS3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLTYT5RW6FV5TOAPS5PDVLVHX5MWJZGB/" source="SUSE-SU"/>
    <description>
    Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32625/">CVE-2021-32625</cve>
	<bugzilla href="https://bugzilla.suse.com/1186722">SUSE bug 1186722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614998" comment="redis-6.0.14-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32678" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32678" ref_url="https://www.suse.com/security/cve/CVE-2021-32678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32678/">CVE-2021-32678</cve>
	<bugzilla href="https://bugzilla.suse.com/1188247">SUSE bug 1188247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32679" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32679" ref_url="https://www.suse.com/security/cve/CVE-2021-32679" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32679/">CVE-2021-32679</cve>
	<bugzilla href="https://bugzilla.suse.com/1188248">SUSE bug 1188248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32680" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32680" ref_url="https://www.suse.com/security/cve/CVE-2021-32680" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions priot to 19.0.13, 20.0.11, and 21.0.3, Nextcloud Server audit logging functionality wasn't properly logging events for the unsetting of a share expiration date. This event is supposed to be logged. This issue is patched in versions 19.0.13, 20.0.11, and 21.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-32680/">CVE-2021-32680</cve>
	<bugzilla href="https://bugzilla.suse.com/1188249">SUSE bug 1188249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32688</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32688" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32688" ref_url="https://www.suse.com/security/cve/CVE-2021-32688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32688/">CVE-2021-32688</cve>
	<bugzilla href="https://bugzilla.suse.com/1188250">SUSE bug 1188250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32703" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32703" ref_url="https://www.suse.com/security/cve/CVE-2021-32703" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the shareinfo endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32703/">CVE-2021-32703</cve>
	<bugzilla href="https://bugzilla.suse.com/1188251">SUSE bug 1188251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32705" ref_url="https://www.suse.com/security/cve/CVE-2021-32705" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32705/">CVE-2021-32705</cve>
	<bugzilla href="https://bugzilla.suse.com/1188252">SUSE bug 1188252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32718</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32718" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32718" ref_url="https://www.suse.com/security/cve/CVE-2021-32718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009557.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWIIK75CV5Y6TWUXN67IYXFNHIHRZSXN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/" source="SUSE-SU"/>
    <description>
    RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `&lt;script&gt;` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32718/">CVE-2021-32718</cve>
	<bugzilla href="https://bugzilla.suse.com/1187818">SUSE bug 1187818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651179" comment="erlang-rabbitmq-client-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154286" comment="erlang-rabbitmq-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651180" comment="rabbitmq-server-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154287" comment="rabbitmq-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651181" comment="rabbitmq-server-plugins-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154288" comment="rabbitmq-server-plugins is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32719" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32719" ref_url="https://www.suse.com/security/cve/CVE-2021-32719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009557.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWIIK75CV5Y6TWUXN67IYXFNHIHRZSXN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/" source="SUSE-SU"/>
    <description>
    RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper &lt;script&gt; tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32719/">CVE-2021-32719</cve>
	<bugzilla href="https://bugzilla.suse.com/1187819">SUSE bug 1187819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651179" comment="erlang-rabbitmq-client-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154286" comment="erlang-rabbitmq-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651180" comment="rabbitmq-server-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154287" comment="rabbitmq-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651181" comment="rabbitmq-server-plugins-3.8.3-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154288" comment="rabbitmq-server-plugins is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3272</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ZF7VRY24X2GVC7MCP6MQKQBRKCSJ2A/" source="SUSE-SU"/>
    <description>
    jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613188" comment="jasper-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613189" comment="libjasper-devel-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613190" comment="libjasper4-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613191" comment="libjasper4-32bit-2.0.14-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32725" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32725" ref_url="https://www.suse.com/security/cve/CVE-2021-32725" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-32725/">CVE-2021-32725</cve>
	<bugzilla href="https://bugzilla.suse.com/1188253">SUSE bug 1188253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32726" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32726" ref_url="https://www.suse.com/security/cve/CVE-2021-32726" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-32726/">CVE-2021-32726</cve>
	<bugzilla href="https://bugzilla.suse.com/1188254">SUSE bug 1188254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32734</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32734" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32734" ref_url="https://www.suse.com/security/cve/CVE-2021-32734" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-32734/">CVE-2021-32734</cve>
	<bugzilla href="https://bugzilla.suse.com/1188255">SUSE bug 1188255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32739" ref_url="https://www.suse.com/security/cve/CVE-2021-32739" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AG46DROWC4ZEVBNIZC5IYVVFYH4FMFCS/" source="SUSE-SU"/>
    <description>
    Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32739/">CVE-2021-32739</cve>
	<bugzilla href="https://bugzilla.suse.com/1188372">SUSE bug 1188372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626690" comment="icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297975" comment="icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626691" comment="icinga2-bin-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297977" comment="icinga2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626692" comment="icinga2-common-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297979" comment="icinga2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626693" comment="icinga2-doc-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297981" comment="icinga2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626694" comment="icinga2-ido-mysql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297983" comment="icinga2-ido-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626695" comment="icinga2-ido-pgsql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297985" comment="icinga2-ido-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626696" comment="nano-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297987" comment="nano-icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626697" comment="vim-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297989" comment="vim-icinga2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32741" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32741" ref_url="https://www.suse.com/security/cve/CVE-2021-32741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
    <description>
    Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public share link mount endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-32741/">CVE-2021-32741</cve>
	<bugzilla href="https://bugzilla.suse.com/1188256">SUSE bug 1188256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625866" comment="nextcloud-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625867" comment="nextcloud-apache-20.0.11-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32743" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32743" ref_url="https://www.suse.com/security/cve/CVE-2021-32743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AG46DROWC4ZEVBNIZC5IYVVFYH4FMFCS/" source="SUSE-SU"/>
    <description>
    Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32743/">CVE-2021-32743</cve>
	<bugzilla href="https://bugzilla.suse.com/1188370">SUSE bug 1188370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626690" comment="icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297975" comment="icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626691" comment="icinga2-bin-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297977" comment="icinga2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626692" comment="icinga2-common-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297979" comment="icinga2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626693" comment="icinga2-doc-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297981" comment="icinga2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626694" comment="icinga2-ido-mysql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297983" comment="icinga2-ido-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626695" comment="icinga2-ido-pgsql-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297985" comment="icinga2-ido-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626696" comment="nano-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297987" comment="nano-icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626697" comment="vim-icinga2-2.12.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297989" comment="vim-icinga2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32749" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32749" ref_url="https://www.suse.com/security/cve/CVE-2021-32749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYBYCPVAMLJBPZO42ZMSVOQTCNN3YNQS/" source="SUSE-SU"/>
    <description>
    fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action mail-whois. Command `mail` from mailutils package used in mail actions like `mail-whois` can execute command if unescaped sequences (`\n~`) are available in "foreign" input (for instance in whois output). To exploit the vulnerability, an attacker would need to insert malicious characters into the response sent by the whois server, either via a MITM attack or by taking over a whois server. The issue is patched in versions 0.10.7 and 0.11.3. As a workaround, one may avoid the usage of action `mail-whois` or patch the vulnerability manually.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32749/">CVE-2021-32749</cve>
	<bugzilla href="https://bugzilla.suse.com/1188610">SUSE bug 1188610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633131" comment="fail2ban-0.11.2-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633132" comment="fail2ban is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633133" comment="monitoring-plugins-fail2ban-0.11.2-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633134" comment="monitoring-plugins-fail2ban is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32760" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOFB4OTX7BGTKOBQF2ZTPBP4VJT54IQS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOVJMTDKAFMTONFNVO7Z327OFE52V7FK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
    <description>
    containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760</cve>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32765" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32765" ref_url="https://www.suse.com/security/cve/CVE-2021-32765" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2J7PHNSWD2ZHOSNIVUJTW2HJ34RJDBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1550-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GSAQE3UZIYGFDEEFR46DV63XWSGJDN3/" source="SUSE-SU"/>
    <description>
    Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32765/">CVE-2021-32765</cve>
	<bugzilla href="https://bugzilla.suse.com/1191331">SUSE bug 1191331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659225" comment="hiredis-0.13.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659226" comment="hiredis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659227" comment="hiredis-devel-0.13.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659228" comment="hiredis-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659229" comment="libhiredis0_13-0.13.3-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659230" comment="libhiredis0_13 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32766" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32766" ref_url="https://www.suse.com/security/cve/CVE-2021-32766" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" source="SUSE-SU"/>
    <description>
    Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32766/">CVE-2021-32766</cve>
	<bugzilla href="https://bugzilla.suse.com/1190291">SUSE bug 1190291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632800" comment="nextcloud-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632801" comment="nextcloud-apache-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32785" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32785" ref_url="https://www.suse.com/security/cve/CVE-2021-32785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGDDGUNYC724M4QGEPJORKASFRVKJ5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32785/">CVE-2021-32785</cve>
	<bugzilla href="https://bugzilla.suse.com/1188638">SUSE bug 1188638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633128" comment="apache2-mod_auth_openidc-2.3.8-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32786" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGDDGUNYC724M4QGEPJORKASFRVKJ5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786</cve>
	<bugzilla href="https://bugzilla.suse.com/1188639">SUSE bug 1188639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633128" comment="apache2-mod_auth_openidc-2.3.8-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32791</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32791" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32791" ref_url="https://www.suse.com/security/cve/CVE-2021-32791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGDDGUNYC724M4QGEPJORKASFRVKJ5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32791/">CVE-2021-32791</cve>
	<bugzilla href="https://bugzilla.suse.com/1188849">SUSE bug 1188849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633128" comment="apache2-mod_auth_openidc-2.3.8-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32792" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32792" ref_url="https://www.suse.com/security/cve/CVE-2021-32792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGDDGUNYC724M4QGEPJORKASFRVKJ5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32792/">CVE-2021-32792</cve>
	<bugzilla href="https://bugzilla.suse.com/1188848">SUSE bug 1188848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633128" comment="apache2-mod_auth_openidc-2.3.8-lp152.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32800" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32800" ref_url="https://www.suse.com/security/cve/CVE-2021-32800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" source="SUSE-SU"/>
    <description>
    Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32800/">CVE-2021-32800</cve>
	<bugzilla href="https://bugzilla.suse.com/1190291">SUSE bug 1190291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632800" comment="nextcloud-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632801" comment="nextcloud-apache-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32801</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32801" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32801" ref_url="https://www.suse.com/security/cve/CVE-2021-32801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" source="SUSE-SU"/>
    <description>
    Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32801/">CVE-2021-32801</cve>
	<bugzilla href="https://bugzilla.suse.com/1190291">SUSE bug 1190291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632800" comment="nextcloud-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632801" comment="nextcloud-apache-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32802" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32802" ref_url="https://www.suse.com/security/cve/CVE-2021-32802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" source="SUSE-SU"/>
    <description>
    Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn't suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-32802/">CVE-2021-32802</cve>
	<bugzilla href="https://bugzilla.suse.com/1190291">SUSE bug 1190291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632800" comment="nextcloud-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632801" comment="nextcloud-apache-20.0.12-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32917" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32917" ref_url="https://www.suse.com/security/cve/CVE-2021-32917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0728-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QFZF2R5S5FEXEQIW4Q7P3QW6HA46PJMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJYSI5GATCA32NI325BJB4SQGVY6RLE7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32917/">CVE-2021-32917</cve>
	<bugzilla href="https://bugzilla.suse.com/1186027">SUSE bug 1186027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614666" comment="prosody-0.11.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223336" comment="prosody is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32918" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32918" ref_url="https://www.suse.com/security/cve/CVE-2021-32918" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0728-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QFZF2R5S5FEXEQIW4Q7P3QW6HA46PJMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJYSI5GATCA32NI325BJB4SQGVY6RLE7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32918/">CVE-2021-32918</cve>
	<bugzilla href="https://bugzilla.suse.com/1186027">SUSE bug 1186027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614666" comment="prosody-0.11.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223336" comment="prosody is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32919</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32919" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32919" ref_url="https://www.suse.com/security/cve/CVE-2021-32919" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0728-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QFZF2R5S5FEXEQIW4Q7P3QW6HA46PJMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJYSI5GATCA32NI325BJB4SQGVY6RLE7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another server (when this option is enabled).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32919/">CVE-2021-32919</cve>
	<bugzilla href="https://bugzilla.suse.com/1186027">SUSE bug 1186027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614666" comment="prosody-0.11.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223336" comment="prosody is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32920</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32920" ref_url="https://www.suse.com/security/cve/CVE-2021-32920" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0728-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QFZF2R5S5FEXEQIW4Q7P3QW6HA46PJMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJYSI5GATCA32NI325BJB4SQGVY6RLE7/" source="SUSE-SU"/>
    <description>
    Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-32920/">CVE-2021-32920</cve>
	<bugzilla href="https://bugzilla.suse.com/1186027">SUSE bug 1186027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614666" comment="prosody-0.11.9-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223336" comment="prosody is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33033</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186283">SUSE bug 1186283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KJLIWWFI3SIH2EDCVQ6J6NITH5JTGPE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JSV3IQW2IZ4TG73GE2HYEJN52YYLT3T/" source="SUSE-SU"/>
    <description>
    Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037</cve>
	<bugzilla href="https://bugzilla.suse.com/1188278">SUSE bug 1188278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657141" comment="tomcat-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657142" comment="tomcat-admin-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657143" comment="tomcat-docs-webapp-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657144" comment="tomcat-el-3_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657145" comment="tomcat-embed-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657146" comment="tomcat-javadoc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657147" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657148" comment="tomcat-jsvc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657149" comment="tomcat-lib-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657150" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657151" comment="tomcat-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33038" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33038" ref_url="https://www.suse.com/security/cve/CVE-2021-33038" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2AYEDFDYQWOWQ75OGHXNDIRLNRDNL5O/" source="SUSE-SU"/>
    <description>
    An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-33038/">CVE-2021-33038</cve>
	<bugzilla href="https://bugzilla.suse.com/1186575">SUSE bug 1186575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615037" comment="python3-HyperKitty-1.3.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009478303" comment="python3-HyperKitty is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3308" ref_url="https://www.suse.com/security/cve/CVE-2021-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and entries setup. Such reboots will leak any vectors used by the MSI(-X) entries that the guest might had enabled, and hence will lead to vector exhaustion on the system, not allowing further PCI pass through devices to work properly. HVM guests with PCI pass through devices can mount a Denial of Service (DoS) attack affecting the pass through of PCI devices to other guests or the hardware domain. In the latter case, this would affect the entire host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3308/">CVE-2021-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/1181254">SUSE bug 1181254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613966" comment="xen-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613967" comment="xen-devel-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613968" comment="xen-doc-html-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613969" comment="xen-libs-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613970" comment="xen-libs-32bit-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613971" comment="xen-tools-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613972" comment="xen-tools-domU-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613973" comment="xen-tools-xendomains-wait-disk-4.13.2_08-lp152.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291434" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXIW57JQ5R7GZCIYAX46QTL35T45Y4MW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ML464OXXVITHCRNCGTP3DMIAYMJEHJEO/" source="SUSE-SU"/>
    <description>
    A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193</cve>
	<bugzilla href="https://bugzilla.suse.com/1189387">SUSE bug 1189387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195686">SUSE bug 1195686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632599" comment="apache2-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632600" comment="apache2-devel-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632601" comment="apache2-doc-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632602" comment="apache2-event-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632603" comment="apache2-example-pages-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632604" comment="apache2-prefork-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632605" comment="apache2-utils-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632606" comment="apache2-worker-2.4.43-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33195</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195</cve>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624114" comment="go1.15-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624115" comment="go1.15-doc-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624116" comment="go1.15-race-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196</cve>
	<bugzilla href="https://bugzilla.suse.com/1186622">SUSE bug 1186622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190589">SUSE bug 1190589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624114" comment="go1.15-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624115" comment="go1.15-doc-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624116" comment="go1.15-race-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197</cve>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624114" comment="go1.15-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624115" comment="go1.15-doc-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624116" comment="go1.15-race-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33198</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198</cve>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624114" comment="go1.15-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624115" comment="go1.15-doc-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624116" comment="go1.15-race-1.15.13-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33200</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-&gt;alu_limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3326</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326</cve>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613426" comment="glibc-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613427" comment="glibc-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613428" comment="glibc-devel-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613429" comment="glibc-devel-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613430" comment="glibc-devel-static-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613431" comment="glibc-devel-static-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613432" comment="glibc-extra-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613433" comment="glibc-html-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613434" comment="glibc-i18ndata-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613435" comment="glibc-info-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613436" comment="glibc-locale-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613437" comment="glibc-locale-base-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613438" comment="glibc-locale-base-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613439" comment="glibc-profile-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613440" comment="glibc-profile-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613441" comment="glibc-utils-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613442" comment="glibc-utils-32bit-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613443" comment="nscd-2.26-lp152.26.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33285" ref_url="https://www.suse.com/security/cve/CVE-2021-33285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33285/">CVE-2021-33285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33286</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33286" ref_url="https://www.suse.com/security/cve/CVE-2021-33286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33286/">CVE-2021-33286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33287</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33287" ref_url="https://www.suse.com/security/cve/CVE-2021-33287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33287/">CVE-2021-33287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33289</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33289" ref_url="https://www.suse.com/security/cve/CVE-2021-33289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33289/">CVE-2021-33289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613038" comment="kernel-debug-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613039" comment="kernel-debug-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613040" comment="kernel-default-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613041" comment="kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613042" comment="kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613043" comment="kernel-default-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613044" comment="kernel-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613045" comment="kernel-docs-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613046" comment="kernel-docs-html-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613047" comment="kernel-kvmsmall-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613048" comment="kernel-kvmsmall-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613049" comment="kernel-macros-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613050" comment="kernel-obs-build-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613051" comment="kernel-obs-qa-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613052" comment="kernel-preempt-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613053" comment="kernel-preempt-devel-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613054" comment="kernel-source-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613055" comment="kernel-source-vanilla-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613056" comment="kernel-syms-5.3.18-lp152.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRGETVIUWL6C53ONKOWQB6XMHGC4U2YM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G567PZ5Z5XTMWM5HHQHCWSMCWQSOWCGA/" source="SUSE-SU"/>
    <description>
    The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515</cve>
	<bugzilla href="https://bugzilla.suse.com/1187419">SUSE bug 1187419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615212" comment="dovecot23-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615213" comment="dovecot23-backend-mysql-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615214" comment="dovecot23-backend-pgsql-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615215" comment="dovecot23-backend-sqlite-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615216" comment="dovecot23-devel-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615217" comment="dovecot23-fts-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615218" comment="dovecot23-fts-lucene-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615219" comment="dovecot23-fts-solr-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615220" comment="dovecot23-fts-squat-2.3.11.3-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQTLJKRQND7UED3XI3J3HC6A2XVGYC7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWMAQ7IJUIENIJYPPEUVGYSZ473DP5EV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516</cve>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615196" comment="libgupnp-1_2-0-1.2.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615787" comment="libgupnp-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615197" comment="libgupnp-1_2-0-32bit-1.2.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615788" comment="libgupnp-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615198" comment="libgupnp-devel-1.2.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615789" comment="libgupnp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615199" comment="typelib-1_0-GUPnP-1_0-1.2.2-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615790" comment="typelib-1_0-GUPnP-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPALT4SBPXXPFJVTZN5FQCXMNVH4GXCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWBBOB3KB4MSVNKBUGK3UIYPYWCHNLS/" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189854">SUSE bug 1189854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199664">SUSE bug 1199664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615205" comment="libgcrypt-cavs-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153048" comment="libgcrypt-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615206" comment="libgcrypt-devel-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615207" comment="libgcrypt-devel-32bit-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153049" comment="libgcrypt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615208" comment="libgcrypt20-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615209" comment="libgcrypt20-32bit-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615210" comment="libgcrypt20-hmac-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153050" comment="libgcrypt20-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615211" comment="libgcrypt20-hmac-32bit-1.8.2-lp152.17.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153051" comment="libgcrypt20-hmac-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189426">SUSE bug 1189426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196766">SUSE bug 1196766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652698" comment="glibc-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652699" comment="glibc-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652700" comment="glibc-devel-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652701" comment="glibc-devel-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652702" comment="glibc-devel-static-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652703" comment="glibc-devel-static-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652704" comment="glibc-extra-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652705" comment="glibc-html-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652706" comment="glibc-i18ndata-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652707" comment="glibc-info-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652708" comment="glibc-locale-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652709" comment="glibc-locale-base-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652710" comment="glibc-locale-base-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652711" comment="glibc-profile-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652712" comment="glibc-profile-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652713" comment="glibc-utils-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652714" comment="glibc-utils-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652715" comment="nscd-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33813" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009125.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTKBUD75B4Z3DOB4IV4QQW7SYIOHQW5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W33THYYFJ4Y4WPUQN66D2YC35Q6ZTRU/" source="SUSE-SU"/>
    <description>
    An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813</cve>
	<bugzilla href="https://bugzilla.suse.com/1187446">SUSE bug 1187446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624835" comment="jdom2-2.0.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624699" comment="jdom2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624836" comment="jdom2-javadoc-2.0.6-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624700" comment="jdom2-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33909</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="TID000020341" ref_url="https://www.suse.com/support/kb/doc/?id=000020341" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626319" comment="kernel-debug-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626320" comment="kernel-debug-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626321" comment="kernel-default-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626322" comment="kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626323" comment="kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626324" comment="kernel-default-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626325" comment="kernel-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626326" comment="kernel-docs-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626327" comment="kernel-docs-html-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626328" comment="kernel-kvmsmall-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626329" comment="kernel-kvmsmall-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626330" comment="kernel-macros-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626331" comment="kernel-obs-build-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626332" comment="kernel-obs-qa-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626333" comment="kernel-preempt-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626334" comment="kernel-preempt-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626335" comment="kernel-source-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626336" comment="kernel-source-vanilla-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626337" comment="kernel-syms-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33910</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009695.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAGPKC3S3ZQN25VD5T76IP4JJFCIWE4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZAKU2IKORZZMOBGJJJTJIICBEZDWUNU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QZX3NUVJOV7AC5ZERG2JQFSEIIX6QJXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPIXUFHECPYFYLXDFG3MHBODZD7H7P2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2809-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFXYBJHAFZNV57EZ4VL2LC446RMO7HVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCSKB4ZMNVGFIMLLPPNFDQMFKY7DLL4L/" source="SUSE-SU"/>
    <description>
    basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652660" comment="libsystemd0-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652661" comment="libsystemd0-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154103" comment="libsystemd0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652662" comment="libsystemd0-mini-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154202" comment="libsystemd0-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652663" comment="libudev-devel-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652664" comment="libudev-devel-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239129" comment="libudev-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652665" comment="libudev-mini-devel-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652666" comment="libudev-mini1-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652667" comment="libudev1-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652668" comment="libudev1-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652669" comment="nss-myhostname-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652670" comment="nss-myhostname-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652671" comment="nss-mymachines-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154203" comment="nss-mymachines is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652672" comment="nss-mymachines-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239130" comment="nss-mymachines-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652673" comment="nss-systemd-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239131" comment="nss-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652674" comment="systemd-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652675" comment="systemd-32bit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652676" comment="systemd-bash-completion-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652677" comment="systemd-container-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652678" comment="systemd-coredump-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239133" comment="systemd-coredump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652679" comment="systemd-devel-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652680" comment="systemd-journal-remote-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652681" comment="systemd-logger-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652682" comment="systemd-mini-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652683" comment="systemd-mini-bash-completion-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154204" comment="systemd-mini-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652684" comment="systemd-mini-container-mini-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239134" comment="systemd-mini-container-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652685" comment="systemd-mini-coredump-mini-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239135" comment="systemd-mini-coredump-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652686" comment="systemd-mini-devel-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652687" comment="systemd-mini-sysvinit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652688" comment="systemd-network-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625975" comment="systemd-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652689" comment="systemd-sysvinit-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652690" comment="udev-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652691" comment="udev-mini-234-lp152.31.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0423-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILVBEHTY5E5NJCJLBHIW7MZUDL25BDR/" source="SUSE-SU"/>
    <description>
    An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613718" comment="libecpg6-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613719" comment="libecpg6-32bit-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613720" comment="libpq5-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613721" comment="libpq5-32bit-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613722" comment="postgresql12-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613723" comment="postgresql12-contrib-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613724" comment="postgresql12-devel-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613725" comment="postgresql12-docs-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613726" comment="postgresql12-llvmjit-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613727" comment="postgresql12-plperl-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613728" comment="postgresql12-plpython-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613729" comment="postgresql12-pltcl-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613730" comment="postgresql12-server-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613731" comment="postgresql12-server-devel-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613732" comment="postgresql12-test-12.6-lp152.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614246" comment="qemu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614247" comment="qemu-arm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614248" comment="qemu-audio-alsa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614249" comment="qemu-audio-pa-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614250" comment="qemu-audio-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614251" comment="qemu-block-curl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614252" comment="qemu-block-dmg-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614253" comment="qemu-block-gluster-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614254" comment="qemu-block-iscsi-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614255" comment="qemu-block-nfs-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614256" comment="qemu-block-rbd-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614257" comment="qemu-block-ssh-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614258" comment="qemu-extra-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614259" comment="qemu-guest-agent-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614260" comment="qemu-ipxe-1.0.0+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614261" comment="qemu-ksm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614262" comment="qemu-kvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614263" comment="qemu-lang-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614264" comment="qemu-linux-user-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614265" comment="qemu-microvm-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614266" comment="qemu-ppc-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614267" comment="qemu-s390-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614268" comment="qemu-seabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614269" comment="qemu-sgabios-8-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614270" comment="qemu-testsuite-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614271" comment="qemu-tools-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614272" comment="qemu-ui-curses-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614273" comment="qemu-ui-gtk-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614274" comment="qemu-ui-sdl-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614275" comment="qemu-ui-spice-app-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614276" comment="qemu-vgabios-1.12.1+-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614277" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614278" comment="qemu-x86-4.2.1-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652636" comment="python2-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231455" comment="python2-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652637" comment="python3-rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231456" comment="python3-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652638" comment="rpm-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652639" comment="rpm-32bit-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151944" comment="rpm-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652640" comment="rpm-build-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151945" comment="rpm-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652641" comment="rpm-devel-4.14.1-lp152.18.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151946" comment="rpm-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614003" comment="kernel-debug-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614004" comment="kernel-debug-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614005" comment="kernel-default-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614006" comment="kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614007" comment="kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614008" comment="kernel-default-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614009" comment="kernel-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614010" comment="kernel-docs-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614011" comment="kernel-docs-html-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614012" comment="kernel-kvmsmall-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614013" comment="kernel-kvmsmall-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614014" comment="kernel-macros-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614015" comment="kernel-obs-build-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614016" comment="kernel-obs-qa-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614017" comment="kernel-preempt-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614018" comment="kernel-preempt-devel-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614019" comment="kernel-source-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614020" comment="kernel-source-vanilla-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614021" comment="kernel-syms-5.3.18-lp152.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3448</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5SXZU2UVUXVIVOLI6OT32WIQ6OJBE5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653859" comment="dnsmasq-2.86-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653860" comment="dnsmasq-utils-2.86-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3449</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRCNDGXHP3DJBJKDGVACNKEWGRZDKQRJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
    <description>
    An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613860" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613861" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613862" comment="libopenssl1_1-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613863" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613864" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613865" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613866" comment="openssl-1_1-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009613867" comment="openssl-1_1-doc-1.1.1d-lp152.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
    <description>
    The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625528" comment="nodejs10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625529" comment="nodejs10-devel-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625530" comment="nodejs10-docs-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625520" comment="nodejs12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625521" comment="nodejs12-devel-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625522" comment="nodejs12-docs-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625531" comment="npm10-10.24.1-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009625523" comment="npm12-12.22.2-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34548" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34548" ref_url="https://www.suse.com/security/cve/CVE-2021-34548" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0926-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJI5DAQGLSGJLTAEBDK3BJ65DR3SJHCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/553MAZKSU2F6B7N6LTWA5YMHITLEL3HL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-34548/">CVE-2021-34548</cve>
	<bugzilla href="https://bugzilla.suse.com/1187322">SUSE bug 1187322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615844" comment="tor-0.4.5.9-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34549</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34549" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34549" ref_url="https://www.suse.com/security/cve/CVE-2021-34549" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0926-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJI5DAQGLSGJLTAEBDK3BJ65DR3SJHCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/553MAZKSU2F6B7N6LTWA5YMHITLEL3HL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-34549/">CVE-2021-34549</cve>
	<bugzilla href="https://bugzilla.suse.com/1187324">SUSE bug 1187324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615844" comment="tor-0.4.5.9-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34550</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34550" ref_url="https://www.suse.com/security/cve/CVE-2021-34550" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0926-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJI5DAQGLSGJLTAEBDK3BJ65DR3SJHCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/553MAZKSU2F6B7N6LTWA5YMHITLEL3HL/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-34550/">CVE-2021-34550</cve>
	<bugzilla href="https://bugzilla.suse.com/1187325">SUSE bug 1187325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615844" comment="tor-0.4.5.9-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34552</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552</cve>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630524" comment="python3-CairoSVG-2.5.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630551" comment="python3-CairoSVG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630525" comment="python3-Pillow-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630552" comment="python3-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630526" comment="python3-Pillow-tk-8.3.1-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630553" comment="python3-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V2VBWNYDPOVJ4NFLIRNHJGULW2GKRQ4T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KY7UHEDTSX6MOHJLHMRNQVBUTCR2XMOB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKQH4LHYIFOWBEGMGHD7S7TTV7JL4U7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZJXXUXBI66VV2PXRNAWN4MCE3AOHNBA/" source="SUSE-SU"/>
    <description>
    The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558</cve>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626341" comment="go1.15-1.15.14-lp152.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626342" comment="go1.15-doc-1.15.14-lp152.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626343" comment="go1.15-race-1.15.14-lp152.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626338" comment="go1.16-1.16.6-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626339" comment="go1.16-doc-1.16.6-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626340" comment="go1.16-race-1.16.6-lp152.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3465" ref_url="https://www.suse.com/security/cve/CVE-2021-3465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008733.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQBZYFULI5NBGLWDHKHSVMRMYNY2XC5Q/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3465/">CVE-2021-3465</cve>
	<bugzilla href="https://bugzilla.suse.com/1184699">SUSE bug 1184699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614565" comment="p7zip-16.02-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152637" comment="p7zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614566" comment="p7zip-doc-16.02-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474267" comment="p7zip-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614567" comment="p7zip-full-16.02-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009474268" comment="p7zip-full is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3468</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCPLDL2TVAMUG4CYPGSPUHQ3KJXENCPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAJ7F7M4LLALLHLSQR7PD7HCTVHGAFMX/" source="SUSE-SU"/>
    <description>
    A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614589" comment="avahi-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614590" comment="avahi-autoipd-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614591" comment="avahi-compat-howl-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614592" comment="avahi-compat-mDNSResponder-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614593" comment="avahi-lang-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614594" comment="avahi-mono-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243731" comment="avahi-mono is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614595" comment="avahi-utils-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614596" comment="avahi-utils-gtk-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614597" comment="libavahi-client3-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614598" comment="libavahi-client3-32bit-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151213" comment="libavahi-client3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614599" comment="libavahi-common3-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614600" comment="libavahi-common3-32bit-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151215" comment="libavahi-common3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614601" comment="libavahi-core7-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614602" comment="libavahi-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614603" comment="libavahi-glib-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614604" comment="libavahi-glib1-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614605" comment="libavahi-glib1-32bit-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243737" comment="libavahi-glib1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614606" comment="libavahi-gobject-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614607" comment="libavahi-gobject0-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614608" comment="libavahi-qt4-1-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243740" comment="libavahi-qt4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614609" comment="libavahi-qt4-devel-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243741" comment="libavahi-qt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614610" comment="libavahi-ui-gtk3-0-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614611" comment="libavahi-ui0-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243743" comment="libavahi-ui0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614612" comment="libdns_sd-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614613" comment="libdns_sd-32bit-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243744" comment="libdns_sd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614614" comment="libhowl0-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614615" comment="python3-avahi-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346636" comment="python3-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614616" comment="python3-avahi-gtk-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614617" comment="typelib-1_0-Avahi-0_6-0.7-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CRPRB7NRFEWN4RTARQEO4ANKTCLF6AS/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614163" comment="xorg-x11-server-1.20.3-lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614164" comment="xorg-x11-server-extra-1.20.3-lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614165" comment="xorg-x11-server-sdk-1.20.3-lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614166" comment="xorg-x11-server-source-1.20.3-lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614167" comment="xorg-x11-server-wayland-1.20.3-lp152.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3474</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3474" ref_url="https://www.suse.com/security/cve/CVE-2021-3474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OEPCGI23GJK5SW2WMNMPUTRJTU2STGG/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3474/">CVE-2021-3474</cve>
	<bugzilla href="https://bugzilla.suse.com/1184174">SUSE bug 1184174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614030" comment="libIlmImf-2_2-23-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614031" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614032" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614033" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614034" comment="openexr-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614035" comment="openexr-devel-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614036" comment="openexr-doc-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3475</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OEPCGI23GJK5SW2WMNMPUTRJTU2STGG/" source="SUSE-SU"/>
    <description>
    There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475</cve>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614030" comment="libIlmImf-2_2-23-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614031" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614032" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614033" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614034" comment="openexr-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614035" comment="openexr-devel-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614036" comment="openexr-doc-2.2.1-lp152.7.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3476</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OEPCGI23GJK5SW2WMNMPUTRJTU2STGG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631848" comment="libIlmImf-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631849" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631850" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631851" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631852" comment="openexr-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631853" comment="openexr-devel-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631854" comment="openexr-doc-2.2.1-lp152.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3477" ref_url="https://www.suse.com/security/cve/CVE-2021-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3477/">CVE-2021-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/1184353">SUSE bug 1184353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614510" comment="libIlmImf-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614511" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614512" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614513" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614514" comment="openexr-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614515" comment="openexr-devel-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614516" comment="openexr-doc-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3479</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614510" comment="libIlmImf-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614511" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614512" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614513" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614514" comment="openexr-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614515" comment="openexr-devel-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614516" comment="openexr-doc-2.2.1-lp152.7.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653895" comment="apache2-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653896" comment="apache2-devel-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653897" comment="apache2-doc-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653898" comment="apache2-event-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653899" comment="apache2-example-pages-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653900" comment="apache2-prefork-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653901" comment="apache2-utils-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653902" comment="apache2-worker-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3481" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUQQL3BSIDANFVPIE65N7IJDJSBTEPHN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBFMOSZDI3WFGNU3EM54DUBD3HAM2LEV/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481</cve>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652692" comment="libQt5Svg5-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652693" comment="libQt5Svg5-32bit-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652694" comment="libqt5-qtsvg-devel-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652695" comment="libqt5-qtsvg-devel-32bit-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652696" comment="libqt5-qtsvg-examples-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652697" comment="libqt5-qtsvg-private-headers-devel-5.12.7-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3483</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614700" comment="cluster-md-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614701" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614702" comment="dlm-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614703" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614704" comment="gfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614705" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614193" comment="kernel-debug-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614194" comment="kernel-debug-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614195" comment="kernel-default-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614196" comment="kernel-default-base-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614197" comment="kernel-default-base-rebuild-5.3.18-lp152.72.1.lp152.8.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614198" comment="kernel-default-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614199" comment="kernel-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614706" comment="kernel-devel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614200" comment="kernel-docs-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614201" comment="kernel-docs-html-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614202" comment="kernel-kvmsmall-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614203" comment="kernel-kvmsmall-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614204" comment="kernel-macros-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614205" comment="kernel-obs-build-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614206" comment="kernel-obs-qa-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614207" comment="kernel-preempt-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614208" comment="kernel-preempt-devel-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614707" comment="kernel-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614708" comment="kernel-rt-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614709" comment="kernel-rt-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614710" comment="kernel-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614711" comment="kernel-rt_debug-devel-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614712" comment="kernel-rt_debug-extra-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614209" comment="kernel-source-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614713" comment="kernel-source-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614210" comment="kernel-source-vanilla-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614211" comment="kernel-syms-5.3.18-lp152.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614714" comment="kernel-syms-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614715" comment="kselftests-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614716" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614717" comment="ocfs2-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614718" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614719" comment="reiserfs-kmp-rt-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614720" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3487</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656679" comment="binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656680" comment="binutils-devel-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656681" comment="binutils-devel-32bit-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656682" comment="binutils-gold-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656683" comment="bpftrace-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654065" comment="bpftrace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656684" comment="bpftrace-tools-0.11.4-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654066" comment="bpftrace-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656685" comment="cross-aarch64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656686" comment="cross-arm-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656687" comment="cross-avr-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656688" comment="cross-epiphany-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656689" comment="cross-hppa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656690" comment="cross-hppa64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656691" comment="cross-i386-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656692" comment="cross-ia64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656693" comment="cross-m68k-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656694" comment="cross-mips-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656695" comment="cross-ppc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656696" comment="cross-ppc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656697" comment="cross-ppc64le-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656698" comment="cross-riscv64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656699" comment="cross-rx-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656700" comment="cross-s390-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656701" comment="cross-s390x-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656702" comment="cross-sparc-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656703" comment="cross-sparc64-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656704" comment="cross-spu-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656705" comment="cross-xtensa-binutils-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656706" comment="libctf-nobfd0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656707" comment="libctf0-2.37-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3491</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/&lt;PID&gt;/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187090">SUSE bug 1187090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624092" comment="cluster-md-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624093" comment="cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342854" comment="cluster-md-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624094" comment="dlm-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624095" comment="dlm-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342856" comment="dlm-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624096" comment="gfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624097" comment="gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342858" comment="gfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614999" comment="kernel-debug-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615000" comment="kernel-debug-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615001" comment="kernel-default-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615002" comment="kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615003" comment="kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615004" comment="kernel-default-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615005" comment="kernel-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624098" comment="kernel-devel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342859" comment="kernel-devel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615006" comment="kernel-docs-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615007" comment="kernel-docs-html-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615008" comment="kernel-kvmsmall-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615009" comment="kernel-kvmsmall-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615010" comment="kernel-macros-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615011" comment="kernel-obs-build-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615012" comment="kernel-obs-qa-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615013" comment="kernel-preempt-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615014" comment="kernel-preempt-devel-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624099" comment="kernel-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624100" comment="kernel-rt-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342861" comment="kernel-rt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624101" comment="kernel-rt-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624102" comment="kernel-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342863" comment="kernel-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624103" comment="kernel-rt_debug-devel-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342864" comment="kernel-rt_debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624104" comment="kernel-rt_debug-extra-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342865" comment="kernel-rt_debug-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615015" comment="kernel-source-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624105" comment="kernel-source-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342866" comment="kernel-source-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615016" comment="kernel-source-vanilla-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615017" comment="kernel-syms-5.3.18-lp152.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624106" comment="kernel-syms-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342867" comment="kernel-syms-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624107" comment="kselftests-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624108" comment="kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342869" comment="kselftests-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624109" comment="ocfs2-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624110" comment="ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342871" comment="ocfs2-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624111" comment="reiserfs-kmp-rt-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342872" comment="reiserfs-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624112" comment="reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342873" comment="reiserfs-kmp-rt_debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3496" ref_url="https://www.suse.com/security/cve/CVE-2021-3496" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCW5XBSBEM6OUDLCSLS5UW7BSRNESS4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXG5OVP6VGZDHK4MFFT7R3RG7DSWAZ4D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-3496/">CVE-2021-3496</cve>
	<bugzilla href="https://bugzilla.suse.com/1184756">SUSE bug 1184756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614674" comment="jhead-3.06.0.1-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GU3E72N7AIZNV6RLT3OM7V74BRCXVX4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4IXFQFYFPMAJPYIAVGSDNJC7W6WWQID/" source="SUSE-SU"/>
    <description>
    GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497</cve>
	<bugzilla href="https://bugzilla.suse.com/1184739">SUSE bug 1184739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632514" comment="gstreamer-plugins-good-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632515" comment="gstreamer-plugins-good-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632516" comment="gstreamer-plugins-good-doc-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632517" comment="gstreamer-plugins-good-extra-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632518" comment="gstreamer-plugins-good-extra-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632519" comment="gstreamer-plugins-good-gtk-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476863" comment="gstreamer-plugins-good-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632520" comment="gstreamer-plugins-good-jack-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476864" comment="gstreamer-plugins-good-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632521" comment="gstreamer-plugins-good-jack-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476865" comment="gstreamer-plugins-good-jack-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632522" comment="gstreamer-plugins-good-lang-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632523" comment="gstreamer-plugins-good-qtqml-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476866" comment="gstreamer-plugins-good-qtqml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3498" ref_url="https://www.suse.com/security/cve/CVE-2021-3498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GU3E72N7AIZNV6RLT3OM7V74BRCXVX4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4IXFQFYFPMAJPYIAVGSDNJC7W6WWQID/" source="SUSE-SU"/>
    <description>
    GStreamer before 1.18.4 might cause heap corruption when parsing certain malformed Matroska files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3498/">CVE-2021-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/1184735">SUSE bug 1184735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632514" comment="gstreamer-plugins-good-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632515" comment="gstreamer-plugins-good-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632516" comment="gstreamer-plugins-good-doc-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632517" comment="gstreamer-plugins-good-extra-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632518" comment="gstreamer-plugins-good-extra-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632519" comment="gstreamer-plugins-good-gtk-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476863" comment="gstreamer-plugins-good-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632520" comment="gstreamer-plugins-good-jack-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476864" comment="gstreamer-plugins-good-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632521" comment="gstreamer-plugins-good-jack-32bit-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476865" comment="gstreamer-plugins-good-jack-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632522" comment="gstreamer-plugins-good-lang-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632523" comment="gstreamer-plugins-good-qtqml-1.16.3-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476866" comment="gstreamer-plugins-good-qtqml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192595">SUSE bug 1192595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0877-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6A76FJWCYCAB3L3OPKMXF4E37JBFGCKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4FJJNOEZPW7IPJGLCW6LJNTZX7JZBBT/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615069" comment="djvulibre-3.5.27-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615070" comment="djvulibre-doc-3.5.27-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615071" comment="libdjvulibre-devel-3.5.27-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615072" comment="libdjvulibre21-3.5.27-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35039" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188126">SUSE bug 1188126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626319" comment="kernel-debug-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626320" comment="kernel-debug-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626321" comment="kernel-default-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626322" comment="kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626323" comment="kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626324" comment="kernel-default-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626325" comment="kernel-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626326" comment="kernel-docs-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626327" comment="kernel-docs-html-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626328" comment="kernel-kvmsmall-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626329" comment="kernel-kvmsmall-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626330" comment="kernel-macros-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626331" comment="kernel-obs-build-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626332" comment="kernel-obs-qa-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626333" comment="kernel-preempt-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626334" comment="kernel-preempt-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626335" comment="kernel-source-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626336" comment="kernel-source-vanilla-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626337" comment="kernel-syms-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CSGIA2DN2ELWOW2J5TFWNTMLKQDBQAH5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q55SWQQWWFLTPBSSMBPSJOSFUIHSY6H6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504</cve>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614778" comment="hivex-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476330" comment="hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614779" comment="hivex-devel-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476331" comment="hivex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614780" comment="hivex-lang-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476332" comment="hivex-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614781" comment="libhivex0-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476333" comment="libhivex0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614782" comment="ocaml-hivex-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476334" comment="ocaml-hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614783" comment="ocaml-hivex-devel-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476335" comment="ocaml-hivex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614784" comment="perl-Win-Hivex-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476336" comment="perl-Win-Hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614785" comment="python-hivex-1.3.14-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476337" comment="python-hivex is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/1186021">SUSE bug 1186021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614942" comment="ceph-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614943" comment="ceph-base-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614944" comment="ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614945" comment="ceph-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614946" comment="ceph-grafana-dashboards-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614947" comment="ceph-immutable-object-cache-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614948" comment="ceph-mds-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614949" comment="ceph-mgr-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614950" comment="ceph-mgr-cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614951" comment="ceph-mgr-dashboard-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614952" comment="ceph-mgr-diskprediction-cloud-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614953" comment="ceph-mgr-diskprediction-local-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614954" comment="ceph-mgr-k8sevents-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614955" comment="ceph-mgr-modules-core-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614956" comment="ceph-mgr-rook-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614957" comment="ceph-mon-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614958" comment="ceph-osd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614959" comment="ceph-prometheus-alerts-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614960" comment="ceph-radosgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614961" comment="ceph-test-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614962" comment="cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614963" comment="cephfs-shell-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614964" comment="libcephfs-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614965" comment="libcephfs2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614966" comment="librados-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614967" comment="librados2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614968" comment="libradospp-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614969" comment="librbd-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614970" comment="librbd1-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614971" comment="librgw-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614972" comment="librgw2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614973" comment="python3-ceph-argparse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614974" comment="python3-ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614975" comment="python3-cephfs-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614976" comment="python3-rados-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614977" comment="python3-rbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614978" comment="python3-rgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614979" comment="rados-objclass-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614980" comment="rbd-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614981" comment="rbd-mirror-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614982" comment="rbd-nbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3514</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3514" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3514" ref_url="https://www.suse.com/security/cve/CVE-2021-3514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKRCMKIKM4Z423PIZY3DK2A4ZMBRUNT/" source="SUSE-SU"/>
    <description>
    When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3514/">CVE-2021-3514</cve>
	<bugzilla href="https://bugzilla.suse.com/1185356">SUSE bug 1185356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615038" comment="389-ds-1.4.3.23~git0.f53d0132b-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168666" comment="389-ds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615039" comment="389-ds-devel-1.4.3.23~git0.f53d0132b-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168668" comment="389-ds-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615040" comment="389-ds-snmp-1.4.3.23~git0.f53d0132b-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253606" comment="389-ds-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615041" comment="lib389-1.4.3.23~git0.f53d0132b-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347740" comment="lib389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615042" comment="libsvrcore0-1.4.3.23~git0.f53d0132b-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347741" comment="libsvrcore0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614735" comment="libxml2-2-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614736" comment="libxml2-2-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614737" comment="libxml2-devel-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614738" comment="libxml2-devel-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614739" comment="libxml2-doc-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614740" comment="libxml2-tools-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614741" comment="python2-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614742" comment="python3-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194438">SUSE bug 1194438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196383">SUSE bug 1196383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614735" comment="libxml2-2-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614736" comment="libxml2-2-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614737" comment="libxml2-devel-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614738" comment="libxml2-devel-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614739" comment="libxml2-doc-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614740" comment="libxml2-tools-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614741" comment="python2-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614742" comment="python3-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614735" comment="libxml2-2-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614736" comment="libxml2-2-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614737" comment="libxml2-devel-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614738" comment="libxml2-devel-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614739" comment="libxml2-doc-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614740" comment="libxml2-tools-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614741" comment="python2-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614742" comment="python3-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3520</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6JSYGHG2J4E7C5MDUDUDEILIMZKTM7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MA4LQPPDXUEKHDKVDM24RJVHSV2EC67P/" source="SUSE-SU"/>
    <description>
    There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520</cve>
	<bugzilla href="https://bugzilla.suse.com/1185438">SUSE bug 1185438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614725" comment="liblz4-1-1.8.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268961" comment="liblz4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614726" comment="liblz4-1-32bit-1.8.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268962" comment="liblz4-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614727" comment="liblz4-devel-1.8.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268963" comment="liblz4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614728" comment="lz4-1.8.0-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268964" comment="lz4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/1185619">SUSE bug 1185619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614942" comment="ceph-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614943" comment="ceph-base-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614944" comment="ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614945" comment="ceph-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614946" comment="ceph-grafana-dashboards-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614947" comment="ceph-immutable-object-cache-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614948" comment="ceph-mds-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614949" comment="ceph-mgr-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614950" comment="ceph-mgr-cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614951" comment="ceph-mgr-dashboard-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614952" comment="ceph-mgr-diskprediction-cloud-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614953" comment="ceph-mgr-diskprediction-local-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614954" comment="ceph-mgr-k8sevents-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614955" comment="ceph-mgr-modules-core-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614956" comment="ceph-mgr-rook-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614957" comment="ceph-mon-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614958" comment="ceph-osd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614959" comment="ceph-prometheus-alerts-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614960" comment="ceph-radosgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614961" comment="ceph-test-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614962" comment="cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614963" comment="cephfs-shell-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614964" comment="libcephfs-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614965" comment="libcephfs2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614966" comment="librados-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614967" comment="librados2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614968" comment="libradospp-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614969" comment="librbd-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614970" comment="librbd1-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614971" comment="librgw-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614972" comment="librgw2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614973" comment="python3-ceph-argparse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614974" comment="python3-ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614975" comment="python3-cephfs-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614976" comment="python3-rados-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614977" comment="python3-rbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614978" comment="python3-rgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614979" comment="rados-objclass-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614980" comment="rbd-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614981" comment="rbd-mirror-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614982" comment="rbd-nbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35266</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35266" ref_url="https://www.suse.com/security/cve/CVE-2021-35266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35266/">CVE-2021-35266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35267</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35267" ref_url="https://www.suse.com/security/cve/CVE-2021-35267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    NTFS-3G versions &lt; 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35267/">CVE-2021-35267</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35268</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35268" ref_url="https://www.suse.com/security/cve/CVE-2021-35268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35268/">CVE-2021-35268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35269</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35269" ref_url="https://www.suse.com/security/cve/CVE-2021-35269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35269/">CVE-2021-35269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531</cve>
	<bugzilla href="https://bugzilla.suse.com/1186020">SUSE bug 1186020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614942" comment="ceph-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614943" comment="ceph-base-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614944" comment="ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614945" comment="ceph-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614946" comment="ceph-grafana-dashboards-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614947" comment="ceph-immutable-object-cache-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303051" comment="ceph-immutable-object-cache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614948" comment="ceph-mds-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614949" comment="ceph-mgr-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614950" comment="ceph-mgr-cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303052" comment="ceph-mgr-cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614951" comment="ceph-mgr-dashboard-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614952" comment="ceph-mgr-diskprediction-cloud-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614953" comment="ceph-mgr-diskprediction-local-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614954" comment="ceph-mgr-k8sevents-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614955" comment="ceph-mgr-modules-core-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303053" comment="ceph-mgr-modules-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614956" comment="ceph-mgr-rook-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614957" comment="ceph-mon-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614958" comment="ceph-osd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614959" comment="ceph-prometheus-alerts-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614960" comment="ceph-radosgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614961" comment="ceph-test-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614962" comment="cephadm-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303054" comment="cephadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614963" comment="cephfs-shell-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614964" comment="libcephfs-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614965" comment="libcephfs2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614966" comment="librados-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614967" comment="librados2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614968" comment="libradospp-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614969" comment="librbd-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614970" comment="librbd1-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614971" comment="librgw-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614972" comment="librgw2-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614973" comment="python3-ceph-argparse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614974" comment="python3-ceph-common-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303055" comment="python3-ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614975" comment="python3-cephfs-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614976" comment="python3-rados-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614977" comment="python3-rbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614978" comment="python3-rgw-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614979" comment="rados-objclass-devel-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614980" comment="rbd-fuse-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614981" comment="rbd-mirror-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614982" comment="rbd-nbd-15.2.12.83+g528da226523-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614735" comment="libxml2-2-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614736" comment="libxml2-2-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614737" comment="libxml2-devel-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614738" comment="libxml2-devel-32bit-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614739" comment="libxml2-doc-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614740" comment="libxml2-tools-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614741" comment="python2-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614742" comment="python3-libxml2-python-2.9.7-lp152.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0886-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7LMMGD465XPYHREX4OT47UCNFPO6QTF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AR6HBOC5J6QPVBH5GMPTQIK63SAT3C5S/" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615093" comment="libxml2-2-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615094" comment="libxml2-2-32bit-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615095" comment="libxml2-devel-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615096" comment="libxml2-devel-32bit-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615097" comment="libxml2-doc-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615098" comment="libxml2-tools-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615099" comment="python2-libxml2-python-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615100" comment="python3-libxml2-python-2.9.7-lp152.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544</cve>
	<bugzilla href="https://bugzilla.suse.com/1186010">SUSE bug 1186010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545</cve>
	<bugzilla href="https://bugzilla.suse.com/1185990">SUSE bug 1185990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3546</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546</cve>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624837" comment="qemu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624838" comment="qemu-arm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624839" comment="qemu-audio-alsa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624840" comment="qemu-audio-pa-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624841" comment="qemu-audio-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624842" comment="qemu-block-curl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624843" comment="qemu-block-dmg-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624844" comment="qemu-block-gluster-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624845" comment="qemu-block-iscsi-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624846" comment="qemu-block-nfs-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624847" comment="qemu-block-rbd-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624848" comment="qemu-block-ssh-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624849" comment="qemu-extra-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624850" comment="qemu-guest-agent-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624851" comment="qemu-ipxe-1.0.0+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624852" comment="qemu-ksm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624853" comment="qemu-kvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624854" comment="qemu-lang-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624855" comment="qemu-linux-user-4.2.1-lp152.9.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624856" comment="qemu-microvm-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624857" comment="qemu-ppc-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624858" comment="qemu-s390-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624859" comment="qemu-seabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624860" comment="qemu-sgabios-8-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624861" comment="qemu-testsuite-4.2.1-lp152.9.16.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624862" comment="qemu-tools-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624863" comment="qemu-ui-curses-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624864" comment="qemu-ui-gtk-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624865" comment="qemu-ui-sdl-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624866" comment="qemu-ui-spice-app-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624867" comment="qemu-vgabios-1.12.1+-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624868" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624869" comment="qemu-x86-4.2.1-lp152.9.16.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35515" ref_url="https://www.suse.com/security/cve/CVE-2021-35515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YA4IHX4VRW7LQHM7JIEPOCPE46TRW6MV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVOH7P2WI6SSS2OORQJBS45T5SKKO7BV/" source="SUSE-SU"/>
    <description>
    When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35515/">CVE-2021-35515</cve>
	<bugzilla href="https://bugzilla.suse.com/1188463">SUSE bug 1188463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629545" comment="apache-commons-compress-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628199" comment="apache-commons-compress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629546" comment="apache-commons-compress-javadoc-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628200" comment="apache-commons-compress-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35516" ref_url="https://www.suse.com/security/cve/CVE-2021-35516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YA4IHX4VRW7LQHM7JIEPOCPE46TRW6MV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVOH7P2WI6SSS2OORQJBS45T5SKKO7BV/" source="SUSE-SU"/>
    <description>
    When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35516/">CVE-2021-35516</cve>
	<bugzilla href="https://bugzilla.suse.com/1188464">SUSE bug 1188464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629545" comment="apache-commons-compress-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628199" comment="apache-commons-compress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629546" comment="apache-commons-compress-javadoc-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628200" comment="apache-commons-compress-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35517" ref_url="https://www.suse.com/security/cve/CVE-2021-35517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YA4IHX4VRW7LQHM7JIEPOCPE46TRW6MV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVOH7P2WI6SSS2OORQJBS45T5SKKO7BV/" source="SUSE-SU"/>
    <description>
    When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35517/">CVE-2021-35517</cve>
	<bugzilla href="https://bugzilla.suse.com/1188465">SUSE bug 1188465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188468">SUSE bug 1188468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629545" comment="apache-commons-compress-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628199" comment="apache-commons-compress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629546" comment="apache-commons-compress-javadoc-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628200" comment="apache-commons-compress-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35538" ref_url="https://www.suse.com/security/cve/CVE-2021-35538" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVTOCSVAK2EXN2GDT2LDLTD72RKC2CAY/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability does not apply to Windows systems. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35538/">CVE-2021-35538</cve>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653786" comment="python3-virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653787" comment="virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653788" comment="virtualbox-devel-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653789" comment="virtualbox-guest-desktop-icons-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653790" comment="virtualbox-guest-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653791" comment="virtualbox-guest-tools-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653792" comment="virtualbox-guest-x11-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653793" comment="virtualbox-host-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653794" comment="virtualbox-kmp-default-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653795" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653796" comment="virtualbox-qt-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653797" comment="virtualbox-vnc-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653798" comment="virtualbox-websrv-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35540" ref_url="https://www.suse.com/security/cve/CVE-2021-35540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVTOCSVAK2EXN2GDT2LDLTD72RKC2CAY/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35540/">CVE-2021-35540</cve>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653786" comment="python3-virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653787" comment="virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653788" comment="virtualbox-devel-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653789" comment="virtualbox-guest-desktop-icons-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653790" comment="virtualbox-guest-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653791" comment="virtualbox-guest-tools-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653792" comment="virtualbox-guest-x11-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653793" comment="virtualbox-host-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653794" comment="virtualbox-kmp-default-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653795" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653796" comment="virtualbox-qt-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653797" comment="virtualbox-vnc-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653798" comment="virtualbox-websrv-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35542" ref_url="https://www.suse.com/security/cve/CVE-2021-35542" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVTOCSVAK2EXN2GDT2LDLTD72RKC2CAY/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35542/">CVE-2021-35542</cve>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653786" comment="python3-virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653787" comment="virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653788" comment="virtualbox-devel-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653789" comment="virtualbox-guest-desktop-icons-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653790" comment="virtualbox-guest-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653791" comment="virtualbox-guest-tools-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653792" comment="virtualbox-guest-x11-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653793" comment="virtualbox-host-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653794" comment="virtualbox-kmp-default-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653795" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653796" comment="virtualbox-qt-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653797" comment="virtualbox-vnc-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653798" comment="virtualbox-websrv-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35545" ref_url="https://www.suse.com/security/cve/CVE-2021-35545" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVTOCSVAK2EXN2GDT2LDLTD72RKC2CAY/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35545/">CVE-2021-35545</cve>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653786" comment="python3-virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653787" comment="virtualbox-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653788" comment="virtualbox-devel-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653789" comment="virtualbox-guest-desktop-icons-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653790" comment="virtualbox-guest-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653791" comment="virtualbox-guest-tools-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653792" comment="virtualbox-guest-x11-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653793" comment="virtualbox-host-source-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653794" comment="virtualbox-kmp-default-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653795" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_lp152.95-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291432" comment="virtualbox-kmp-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653796" comment="virtualbox-qt-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653797" comment="virtualbox-vnc-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653798" comment="virtualbox-websrv-6.1.28-lp152.2.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35550</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35564</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35586</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35588</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABSE3IWWQYLOHOVCNFCOZVXFZAYMJYN4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NCYKG2YTUVFTW5R7DJWWWJGLDWU7XE5/" source="SUSE-SU"/>
    <description>
    It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614992" comment="libpolkit0-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614993" comment="libpolkit0-32bit-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614994" comment="polkit-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614995" comment="polkit-devel-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614996" comment="polkit-doc-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009614997" comment="typelib-1_0-Polkit-1_0-0.116-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35603</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656916" comment="java-11-openjdk-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656917" comment="java-11-openjdk-accessibility-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656918" comment="java-11-openjdk-demo-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656919" comment="java-11-openjdk-devel-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656920" comment="java-11-openjdk-headless-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656921" comment="java-11-openjdk-javadoc-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656922" comment="java-11-openjdk-jmods-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656923" comment="java-11-openjdk-src-11.0.13.0-lp152.2.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654250" comment="java-1_8_0-openj9-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298898" comment="java-1_8_0-openj9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654251" comment="java-1_8_0-openj9-accessibility-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298899" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654252" comment="java-1_8_0-openj9-demo-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298900" comment="java-1_8_0-openj9-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654253" comment="java-1_8_0-openj9-devel-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298901" comment="java-1_8_0-openj9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654254" comment="java-1_8_0-openj9-headless-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298902" comment="java-1_8_0-openj9-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654255" comment="java-1_8_0-openj9-javadoc-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298903" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654256" comment="java-1_8_0-openj9-src-1.8.0.312-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298904" comment="java-1_8_0-openj9-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657887" comment="java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657888" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657889" comment="java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657890" comment="java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657891" comment="java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657892" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657893" comment="java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630546" comment="transfig-3.2.8a-lp152.6.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZASBJ3FN3JZGC355THWVD23XE5B5NBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FABT25LIO7DOQ34GM7NCGQ5RVCTZMIJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565</cve>
	<bugzilla href="https://bugzilla.suse.com/1186490">SUSE bug 1186490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615871" comment="tpm2.0-tools-4.1-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615872" comment="tpm2.0-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWXNSU7RCV6WGSN2JK7NWBUOQVY6MMXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2414-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHOZ6ZP4DJK5HMVJDBHGX4ILPY5COAZM/" source="SUSE-SU"/>
    <description>
    A flaw was found in Caribou due to a regression of CVE-2020-25712 fix. An attacker could use this flaw to bypass screen-locking applications that leverage Caribou as an input mechanism. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626193" comment="caribou-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624056" comment="caribou is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626194" comment="caribou-common-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624057" comment="caribou-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626195" comment="caribou-devel-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624058" comment="caribou-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626196" comment="caribou-gtk-module-common-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624059" comment="caribou-gtk-module-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626197" comment="caribou-gtk2-module-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624060" comment="caribou-gtk2-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626198" comment="caribou-gtk3-module-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624061" comment="caribou-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626199" comment="caribou-lang-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624062" comment="caribou-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626200" comment="libcaribou0-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624063" comment="libcaribou0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626201" comment="typelib-1_0-Caribou-1_0-0.4.21-lp152.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624064" comment="typelib-1_0-Caribou-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SID77H42G7M3XGNJH7J3TZVHCIZENMVJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQJH6H27YAC2H2WM75ZCWCXIEK3AXNV3/" source="SUSE-SU"/>
    <description>
    A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629522" comment="linuxptp-1.8+git65.g303b08c-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009629547" comment="linuxptp is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3572</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0942-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUNI6NFKZWNNCWYSS3RCLQBQM3PYJFRI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4001-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BN7ZQZP5LV6NPIUJPUMF2NJNETRO5VW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE4FAITJGXBINDGLYSFS5X56QIHQLF3Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2476MS7B5R3KZZUCZGHTC6PPIJ5FNFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIJEKYM4YUBF5BNOIOCERQP3O7PRCGXB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULIK4RFHGHTVVWROQ6NTBBB4JWOGWYD6/" source="SUSE-SU"/>
    <description>
    A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660277" comment="python2-pip-10.0.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294865" comment="python2-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660278" comment="python2-pip-wheel-10.0.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337921" comment="python2-pip-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660279" comment="python3-pip-10.0.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660280" comment="python3-pip-wheel-10.0.1-lp152.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337922" comment="python3-pip-wheel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
    <description>
    A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624310" comment="kernel-debug-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624311" comment="kernel-debug-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624312" comment="kernel-default-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624313" comment="kernel-default-base-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624314" comment="kernel-default-base-rebuild-5.3.18-lp152.81.1.lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624315" comment="kernel-default-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624316" comment="kernel-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624317" comment="kernel-docs-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624318" comment="kernel-docs-html-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624319" comment="kernel-kvmsmall-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624320" comment="kernel-kvmsmall-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624321" comment="kernel-macros-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624322" comment="kernel-obs-build-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624323" comment="kernel-obs-qa-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624324" comment="kernel-preempt-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624325" comment="kernel-preempt-devel-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624326" comment="kernel-source-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624327" comment="kernel-source-vanilla-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009624328" comment="kernel-syms-5.3.18-lp152.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3578" ref_url="https://www.suse.com/security/cve/CVE-2021-3578" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6A6P63QN4YYJFZ5R2SZQBKXYFGDXZYW4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQ4XPQS64MRK2IISZ5VX7AUEMHFJ2EB7/" source="SUSE-SU"/>
    <description>
    A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-3578/">CVE-2021-3578</cve>
	<bugzilla href="https://bugzilla.suse.com/1186939">SUSE bug 1186939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631503" comment="isync-1.3.6-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350656" comment="isync is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3580</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4XGPKTRWLOEATNJNZGQZCO6BZTKIKJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580</cve>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187892">SUSE bug 1187892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615150" comment="libhogweed4-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177221" comment="libhogweed4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615151" comment="libhogweed4-32bit-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242425" comment="libhogweed4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615152" comment="libnettle-devel-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615153" comment="libnettle-devel-32bit-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615154" comment="libnettle6-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177222" comment="libnettle6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615155" comment="libnettle6-32bit-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242426" comment="libnettle6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615156" comment="nettle-3.4.1-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3582</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3582" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35942</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652698" comment="glibc-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652699" comment="glibc-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652700" comment="glibc-devel-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652701" comment="glibc-devel-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652702" comment="glibc-devel-static-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652703" comment="glibc-devel-static-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652704" comment="glibc-extra-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652705" comment="glibc-html-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652706" comment="glibc-i18ndata-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652707" comment="glibc-info-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652708" comment="glibc-locale-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652709" comment="glibc-locale-base-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652710" comment="glibc-locale-base-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652711" comment="glibc-profile-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652712" comment="glibc-profile-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652713" comment="glibc-utils-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652714" comment="glibc-utils-32bit-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652715" comment="nscd-2.26-lp152.26.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJ54NGEKD6JFKYVYG6R2JQZI2N5GDOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN5N7FWEJ6MCV273IVKMPXUXFO2LDVCF/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598</cve>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615837" comment="libIlmImf-2_2-23-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615838" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615839" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615840" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615841" comment="openexr-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615842" comment="openexr-devel-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615843" comment="openexr-doc-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3605</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJ54NGEKD6JFKYVYG6R2JQZI2N5GDOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN5N7FWEJ6MCV273IVKMPXUXFO2LDVCF/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615837" comment="libIlmImf-2_2-23-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615838" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615839" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615840" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615841" comment="openexr-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615842" comment="openexr-devel-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009615843" comment="openexr-doc-2.2.1-lp152.7.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3608" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188720">SUSE bug 1188720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626319" comment="kernel-debug-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626320" comment="kernel-debug-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626321" comment="kernel-default-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626322" comment="kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626323" comment="kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626324" comment="kernel-default-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626325" comment="kernel-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626326" comment="kernel-docs-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626327" comment="kernel-docs-html-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626328" comment="kernel-kvmsmall-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626329" comment="kernel-kvmsmall-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626330" comment="kernel-macros-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626331" comment="kernel-obs-build-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626332" comment="kernel-obs-qa-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626333" comment="kernel-preempt-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626334" comment="kernel-preempt-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626335" comment="kernel-source-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626336" comment="kernel-source-vanilla-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626337" comment="kernel-syms-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36090</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36090" ref_url="https://www.suse.com/security/cve/CVE-2021-36090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YA4IHX4VRW7LQHM7JIEPOCPE46TRW6MV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVOH7P2WI6SSS2OORQJBS45T5SKKO7BV/" source="SUSE-SU"/>
    <description>
    When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36090/">CVE-2021-36090</cve>
	<bugzilla href="https://bugzilla.suse.com/1188466">SUSE bug 1188466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629545" comment="apache-commons-compress-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628199" comment="apache-commons-compress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629546" comment="apache-commons-compress-javadoc-1.21-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009628200" comment="apache-commons-compress-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3611</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193914">SUSE bug 1193914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3612</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626319" comment="kernel-debug-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626320" comment="kernel-debug-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626321" comment="kernel-default-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626322" comment="kernel-default-base-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626323" comment="kernel-default-base-rebuild-5.3.18-lp152.84.1.lp152.8.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626324" comment="kernel-default-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626325" comment="kernel-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626326" comment="kernel-docs-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626327" comment="kernel-docs-html-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626328" comment="kernel-kvmsmall-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626329" comment="kernel-kvmsmall-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626330" comment="kernel-macros-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626331" comment="kernel-obs-build-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626332" comment="kernel-obs-qa-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626333" comment="kernel-preempt-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626334" comment="kernel-preempt-devel-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626335" comment="kernel-source-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626336" comment="kernel-source-vanilla-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009626337" comment="kernel-syms-5.3.18-lp152.84.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36160</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36160" ref_url="https://www.suse.com/security/cve/CVE-2021-36160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36160/">CVE-2021-36160</cve>
	<bugzilla href="https://bugzilla.suse.com/1190702">SUSE bug 1190702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653895" comment="apache2-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653896" comment="apache2-devel-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653897" comment="apache2-doc-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653898" comment="apache2-event-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653899" comment="apache2-example-pages-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653900" comment="apache2-prefork-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653901" comment="apache2-utils-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653902" comment="apache2-worker-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32JUFL2YE6SH6B4KF762VVSDUIQI7ZKU/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621</cve>
	<bugzilla href="https://bugzilla.suse.com/1189492">SUSE bug 1189492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634501" comment="libipa_hbac-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152068" comment="libipa_hbac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634502" comment="libipa_hbac0-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152069" comment="libipa_hbac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634503" comment="libnfsidmap-sss-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231788" comment="libnfsidmap-sss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634504" comment="libsss_certmap-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231789" comment="libsss_certmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634505" comment="libsss_certmap0-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634506" comment="libsss_idmap-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152070" comment="libsss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634507" comment="libsss_idmap0-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634508" comment="libsss_nss_idmap-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152071" comment="libsss_nss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634509" comment="libsss_nss_idmap0-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634510" comment="libsss_simpleifp-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231791" comment="libsss_simpleifp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634511" comment="libsss_simpleifp0-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231792" comment="libsss_simpleifp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634512" comment="python3-ipa_hbac-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231793" comment="python3-ipa_hbac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634513" comment="python3-sss-murmur-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231794" comment="python3-sss-murmur is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634514" comment="python3-sss_nss_idmap-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231795" comment="python3-sss_nss_idmap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634515" comment="python3-sssd-config-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231796" comment="python3-sssd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634516" comment="sssd-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634517" comment="sssd-ad-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152077" comment="sssd-ad is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634518" comment="sssd-common-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632505" comment="sssd-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634519" comment="sssd-dbus-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231797" comment="sssd-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634520" comment="sssd-ipa-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152078" comment="sssd-ipa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634521" comment="sssd-krb5-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152079" comment="sssd-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634522" comment="sssd-krb5-common-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634523" comment="sssd-ldap-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634524" comment="sssd-proxy-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152080" comment="sssd-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634525" comment="sssd-tools-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152081" comment="sssd-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634526" comment="sssd-wbclient-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231798" comment="sssd-wbclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634527" comment="sssd-wbclient-devel-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231799" comment="sssd-wbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634528" comment="sssd-winbind-idmap-1.16.1-lp152.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231800" comment="sssd-winbind-idmap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUSEK4W6EWPU4TCOU42FNZFNKGMKOJLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FC5F3EO3ROUN3SV32U3TNFWTKZ6B6TA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634813" comment="hivex-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476330" comment="hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634814" comment="hivex-devel-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476331" comment="hivex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634815" comment="hivex-lang-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476332" comment="hivex-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634816" comment="libhivex0-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476333" comment="libhivex0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634817" comment="ocaml-hivex-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476334" comment="ocaml-hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634818" comment="ocaml-hivex-devel-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476335" comment="ocaml-hivex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634819" comment="perl-Win-Hivex-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476336" comment="perl-Win-Hivex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634820" comment="python-hivex-1.3.14-lp152.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476337" comment="python-hivex is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5LR4TSGW4J25HER35GR4VSKSJCKQY4GC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YUFZSLKF2GBNSU2QJCJH73WU2LSGQ5O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FPUQARVFSVTNWXPM6OPHZLDEEMVSSM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QBLRS3I4ZUSJEMER3J6HA6RD4XDIQYHC/" source="SUSE-SU"/>
    <description>
    Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221</cve>
	<bugzilla href="https://bugzilla.suse.com/1189162">SUSE bug 1189162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632007" comment="go1.15-1.15.15-lp152.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303056" comment="go1.15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632008" comment="go1.15-doc-1.15.15-lp152.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303057" comment="go1.15-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632009" comment="go1.15-race-1.15.15-lp152.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303058" comment="go1.15-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631855" comment="go1.16-1.16.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631856" comment="go1.16-doc-1.16.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631857" comment="go1.16-race-1.16.7-lp152.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YD36VO3UYG3QGTYXP2IABP7W52ZZE6X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22SNDEWZFK4UZGGV35YI72FNLVIRJTIF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631593" comment="krb5-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631594" comment="krb5-32bit-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631595" comment="krb5-client-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631596" comment="krb5-devel-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631597" comment="krb5-devel-32bit-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631598" comment="krb5-mini-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631599" comment="krb5-mini-devel-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631600" comment="krb5-plugin-kdb-ldap-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631601" comment="krb5-plugin-preauth-otp-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631602" comment="krb5-plugin-preauth-pkinit-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631603" comment="krb5-server-1.16.3-lp152.5.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3630</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009319.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NS5SRA6CXGTX6C5SHQQRIPVMUAZ326KY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTM6WP5W5E6E2WSTHST5KAOESVI2S47B/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault. This flaw affects DjVuLibre versions prior to 3.5.28.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629524" comment="djvulibre-3.5.27-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629525" comment="djvulibre-doc-3.5.27-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629526" comment="libdjvulibre-devel-3.5.27-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009629527" comment="libdjvulibre21-3.5.27-lp152.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3631</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5E4Y5JNZAR2C5I2WQMIIPVYTGLK5SBC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4QAQWSVV2PRNPOI4R3VBPRTRXS5NLQ5/" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631</cve>
	<bugzilla href="https://bugzilla.suse.com/1187871">SUSE bug 1187871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630432" comment="libvirt-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630433" comment="libvirt-admin-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630434" comment="libvirt-bash-completion-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630435" comment="libvirt-client-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630436" comment="libvirt-daemon-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630437" comment="libvirt-daemon-config-network-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630438" comment="libvirt-daemon-config-nwfilter-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630439" comment="libvirt-daemon-driver-interface-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630440" comment="libvirt-daemon-driver-libxl-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630441" comment="libvirt-daemon-driver-lxc-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630442" comment="libvirt-daemon-driver-network-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630443" comment="libvirt-daemon-driver-nodedev-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630444" comment="libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630445" comment="libvirt-daemon-driver-qemu-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630446" comment="libvirt-daemon-driver-secret-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630447" comment="libvirt-daemon-driver-storage-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630448" comment="libvirt-daemon-driver-storage-core-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630449" comment="libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630450" comment="libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630451" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630452" comment="libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630453" comment="libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630454" comment="libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630455" comment="libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630456" comment="libvirt-daemon-hooks-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630457" comment="libvirt-daemon-lxc-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630458" comment="libvirt-daemon-qemu-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630459" comment="libvirt-daemon-xen-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630460" comment="libvirt-devel-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630461" comment="libvirt-devel-32bit-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630462" comment="libvirt-doc-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630463" comment="libvirt-libs-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630464" comment="libvirt-lock-sanlock-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630465" comment="libvirt-nss-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630466" comment="wireshark-plugin-libvirt-6.0.0-lp152.9.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009892.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1183-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/467HBFXGJJT2G2NY45XULNMMNRQKSY46/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQSBOFKUN3D2SAYKHGH2NQW7UGR6J7P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMV7EBXEZS74TUNOO7AISIYY6S7T7TDO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/" source="SUSE-SU"/>
    <description>
    report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660217" comment="fetchmail-6.4.22-lp152.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660218" comment="fetchmailconf-6.4.22-lp152.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631524" comment="fetchmailconf is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191530">SUSE bug 1191530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009364.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ABU3X6UN2T7T6CM6IV43OUZVX56S5O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E6YUB5M37IM7IMXZ65R3QTW6TPO6B3OS/" source="SUSE-SU"/>
    <description>
    A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652</cve>
	<bugzilla href="https://bugzilla.suse.com/1188455">SUSE bug 1188455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632134" comment="389-ds-1.4.3.24~git13.7b705e743-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168666" comment="389-ds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632135" comment="389-ds-devel-1.4.3.24~git13.7b705e743-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168668" comment="389-ds-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632136" comment="389-ds-snmp-1.4.3.24~git13.7b705e743-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253606" comment="389-ds-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632137" comment="lib389-1.4.3.24~git13.7b705e743-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347740" comment="lib389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632138" comment="libsvrcore0-1.4.3.24~git13.7b705e743-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347741" comment="libsvrcore0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630527" comment="kernel-debug-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630528" comment="kernel-debug-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630529" comment="kernel-default-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630530" comment="kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630531" comment="kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630532" comment="kernel-default-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630533" comment="kernel-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630534" comment="kernel-docs-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630535" comment="kernel-docs-html-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630536" comment="kernel-kvmsmall-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630537" comment="kernel-kvmsmall-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630538" comment="kernel-macros-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630539" comment="kernel-obs-build-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630540" comment="kernel-obs-qa-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630541" comment="kernel-preempt-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630542" comment="kernel-preempt-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630543" comment="kernel-source-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630544" comment="kernel-source-vanilla-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630545" comment="kernel-syms-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CVWPLSZA7CNFAIOW3HV4ZWDNXKWJDSE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4QAQWSVV2PRNPOI4R3VBPRTRXS5NLQ5/" source="SUSE-SU"/>
    <description>
    An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667</cve>
	<bugzilla href="https://bugzilla.suse.com/1188843">SUSE bug 1188843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654203" comment="libvirt-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654204" comment="libvirt-admin-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654205" comment="libvirt-bash-completion-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654206" comment="libvirt-client-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654207" comment="libvirt-daemon-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654208" comment="libvirt-daemon-config-network-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654209" comment="libvirt-daemon-config-nwfilter-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654210" comment="libvirt-daemon-driver-interface-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654211" comment="libvirt-daemon-driver-libxl-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654212" comment="libvirt-daemon-driver-lxc-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654213" comment="libvirt-daemon-driver-network-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654214" comment="libvirt-daemon-driver-nodedev-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654215" comment="libvirt-daemon-driver-nwfilter-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654216" comment="libvirt-daemon-driver-qemu-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654217" comment="libvirt-daemon-driver-secret-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654218" comment="libvirt-daemon-driver-storage-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654219" comment="libvirt-daemon-driver-storage-core-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654220" comment="libvirt-daemon-driver-storage-disk-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654221" comment="libvirt-daemon-driver-storage-gluster-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654222" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654223" comment="libvirt-daemon-driver-storage-logical-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654224" comment="libvirt-daemon-driver-storage-mpath-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654225" comment="libvirt-daemon-driver-storage-rbd-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654226" comment="libvirt-daemon-driver-storage-scsi-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654227" comment="libvirt-daemon-hooks-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654228" comment="libvirt-daemon-lxc-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654229" comment="libvirt-daemon-qemu-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654230" comment="libvirt-daemon-xen-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654231" comment="libvirt-devel-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654232" comment="libvirt-devel-32bit-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654233" comment="libvirt-doc-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654234" comment="libvirt-libs-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654235" comment="libvirt-lock-sanlock-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654236" comment="libvirt-nss-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654237" comment="wireshark-plugin-libvirt-6.0.0-lp152.9.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2760-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGOSTA5JEGSS4FAXRRSGJYRZUQK3LXPV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4F2ZKNNMGENSNMAS5CDHA3CDDRAXF3AQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193099">SUSE bug 1193099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631332" comment="c-ares-devel-1.17.1+20200724-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300208" comment="c-ares-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631333" comment="c-ares-utils-1.17.1+20200724-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300210" comment="c-ares-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631334" comment="libcares2-1.17.1+20200724-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631335" comment="libcares2-32bit-1.17.1+20200724-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153707" comment="libcares2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632617" comment="nodejs10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632618" comment="nodejs10-devel-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632619" comment="nodejs10-docs-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632222" comment="nodejs12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632223" comment="nodejs12-devel-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632224" comment="nodejs12-docs-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634497" comment="nodejs14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634498" comment="nodejs14-devel-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634499" comment="nodejs14-docs-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632620" comment="npm10-10.24.1-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632225" comment="npm12-12.22.5-lp152.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634500" comment="npm14-14.17.5-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630527" comment="kernel-debug-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630528" comment="kernel-debug-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630529" comment="kernel-default-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630530" comment="kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630531" comment="kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630532" comment="kernel-default-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630533" comment="kernel-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630534" comment="kernel-docs-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630535" comment="kernel-docs-html-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630536" comment="kernel-kvmsmall-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630537" comment="kernel-kvmsmall-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630538" comment="kernel-macros-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630539" comment="kernel-obs-build-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630540" comment="kernel-obs-qa-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630541" comment="kernel-preempt-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630542" comment="kernel-preempt-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630543" comment="kernel-source-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630544" comment="kernel-source-vanilla-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630545" comment="kernel-syms-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3682" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631922" comment="qemu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631923" comment="qemu-arm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631924" comment="qemu-audio-alsa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631925" comment="qemu-audio-pa-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631926" comment="qemu-audio-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631927" comment="qemu-block-curl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631928" comment="qemu-block-dmg-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631929" comment="qemu-block-gluster-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631930" comment="qemu-block-iscsi-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631931" comment="qemu-block-nfs-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631932" comment="qemu-block-rbd-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631933" comment="qemu-block-ssh-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631934" comment="qemu-extra-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631935" comment="qemu-guest-agent-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631936" comment="qemu-ipxe-1.0.0+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631937" comment="qemu-ksm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631938" comment="qemu-kvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631939" comment="qemu-lang-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631940" comment="qemu-linux-user-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631941" comment="qemu-microvm-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631942" comment="qemu-ppc-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631943" comment="qemu-s390-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631944" comment="qemu-seabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631945" comment="qemu-sgabios-8-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631946" comment="qemu-testsuite-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631947" comment="qemu-tools-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631948" comment="qemu-ui-curses-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631949" comment="qemu-ui-gtk-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631950" comment="qemu-ui-sdl-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631951" comment="qemu-ui-spice-app-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631952" comment="qemu-vgabios-1.12.1+-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631953" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631954" comment="qemu-x86-4.2.1-lp152.9.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
    <description>
    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631777" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631778" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631779" comment="libopenssl1_1-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631780" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631781" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631782" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631783" comment="openssl-1_1-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631784" comment="openssl-1_1-doc-1.1.1d-lp152.7.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJMNXN2ETVF67Q4UKMXBSCF2LIA5HVUH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTAMI3TGUD3BTSIO4MHIHCP2H4HJWRWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE6BERTPDDZTU2D7PHOS5VANHEPO7VG4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZPO3HVVYNS6WITBZKOQFXIVLJOK24MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O65IINGUXDYQLSV7GD7SXFUKFY5WYUTA/" source="SUSE-SU"/>
    <description>
    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191640">SUSE bug 1191640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192787">SUSE bug 1192787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632807" comment="libopenssl-1_0_0-devel-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632808" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632717" comment="libopenssl-1_1-devel-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632718" comment="libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632809" comment="libopenssl10-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338634" comment="libopenssl10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632810" comment="libopenssl1_0_0-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632811" comment="libopenssl1_0_0-32bit-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632812" comment="libopenssl1_0_0-hmac-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632813" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632814" comment="libopenssl1_0_0-steam-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632815" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632719" comment="libopenssl1_1-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632720" comment="libopenssl1_1-32bit-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632721" comment="libopenssl1_1-hmac-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632722" comment="libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632816" comment="openssl-1_0_0-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632817" comment="openssl-1_0_0-cavs-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632818" comment="openssl-1_0_0-doc-1.0.2p-lp152.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632723" comment="openssl-1_1-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632724" comment="openssl-1_1-doc-1.1.1d-lp152.7.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3713" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ANWCSILNO3HSV5PUK6VESGM76PNM5ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSD5Q5DPWCTYJNLRUS2DHTA3G6VDKLMV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POCCYWA7A3O442ZTZU3JW7O7VFGCLOEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice-&gt;data3 and UASDevice-&gt;status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713</cve>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654443" comment="qemu-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654444" comment="qemu-arm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654445" comment="qemu-audio-alsa-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654446" comment="qemu-audio-pa-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654447" comment="qemu-audio-sdl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654448" comment="qemu-block-curl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654449" comment="qemu-block-dmg-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654450" comment="qemu-block-gluster-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654451" comment="qemu-block-iscsi-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654452" comment="qemu-block-nfs-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654453" comment="qemu-block-rbd-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654454" comment="qemu-block-ssh-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654455" comment="qemu-extra-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654456" comment="qemu-guest-agent-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654457" comment="qemu-ipxe-1.0.0+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654458" comment="qemu-ksm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654459" comment="qemu-kvm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654460" comment="qemu-lang-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654461" comment="qemu-linux-user-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654462" comment="qemu-microvm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654463" comment="qemu-ppc-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654464" comment="qemu-s390-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654465" comment="qemu-seabios-1.12.1+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654466" comment="qemu-sgabios-8-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654467" comment="qemu-testsuite-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654468" comment="qemu-tools-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654469" comment="qemu-ui-curses-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654470" comment="qemu-ui-gtk-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654471" comment="qemu-ui-sdl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654472" comment="qemu-ui-spice-app-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654473" comment="qemu-vgabios-1.12.1+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654474" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654475" comment="qemu-x86-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3715</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37159</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A security issue was found in Linux kernel’s OverlayFS subsystem where a local attacker who has the ability to mount the TmpFS filesystem with OverlayFS can abuse a logic bug in the overlayfs code which can inadvertently reveal files hidden in the original mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3733</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AF3KRDWJVTDRPTV5WLKDBFKVCOCN3FB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6W7MZS6RUFRYSZTBDYHTA2EBBSY2QJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
    <description>
    There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653835" comment="libpython2_7-1_0-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653836" comment="libpython2_7-1_0-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653837" comment="python-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653838" comment="python-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653839" comment="python-base-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653840" comment="python-base-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653841" comment="python-curses-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653842" comment="python-demo-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653843" comment="python-devel-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653844" comment="python-doc-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653845" comment="python-doc-pdf-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653846" comment="python-gdbm-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653847" comment="python-idle-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653848" comment="python-tk-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653849" comment="python-xml-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3737</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AF3KRDWJVTDRPTV5WLKDBFKVCOCN3FB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6W7MZS6RUFRYSZTBDYHTA2EBBSY2QJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
    <description>
    A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653835" comment="libpython2_7-1_0-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653836" comment="libpython2_7-1_0-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653837" comment="python-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653838" comment="python-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653839" comment="python-base-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653840" comment="python-base-32bit-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653841" comment="python-curses-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653842" comment="python-demo-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653843" comment="python-devel-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653844" comment="python-doc-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653845" comment="python-doc-pdf-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653846" comment="python-gdbm-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653847" comment="python-idle-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653848" comment="python-tk-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653849" comment="python-xml-2.7.18-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3744</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3748</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ANWCSILNO3HSV5PUK6VESGM76PNM5ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSD5Q5DPWCTYJNLRUS2DHTA3G6VDKLMV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POCCYWA7A3O442ZTZU3JW7O7VFGCLOEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748</cve>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654443" comment="qemu-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654444" comment="qemu-arm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654445" comment="qemu-audio-alsa-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654446" comment="qemu-audio-pa-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654447" comment="qemu-audio-sdl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654448" comment="qemu-block-curl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654449" comment="qemu-block-dmg-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654450" comment="qemu-block-gluster-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654451" comment="qemu-block-iscsi-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654452" comment="qemu-block-nfs-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654453" comment="qemu-block-rbd-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654454" comment="qemu-block-ssh-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654455" comment="qemu-extra-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654456" comment="qemu-guest-agent-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654457" comment="qemu-ipxe-1.0.0+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654458" comment="qemu-ksm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654459" comment="qemu-kvm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654460" comment="qemu-lang-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654461" comment="qemu-linux-user-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654462" comment="qemu-microvm-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654463" comment="qemu-ppc-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654464" comment="qemu-s390-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654465" comment="qemu-seabios-1.12.1+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654466" comment="qemu-sgabios-8-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654467" comment="qemu-testsuite-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654468" comment="qemu-tools-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654469" comment="qemu-ui-curses-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654470" comment="qemu-ui-gtk-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654471" comment="qemu-ui-sdl-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654472" comment="qemu-ui-spice-app-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654473" comment="qemu-vgabios-1.12.1+-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654474" comment="qemu-vhost-user-gpu-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654475" comment="qemu-x86-4.2.1-lp152.9.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37576</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630527" comment="kernel-debug-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630528" comment="kernel-debug-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630529" comment="kernel-default-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630530" comment="kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630531" comment="kernel-default-base-rebuild-5.3.18-lp152.87.1.lp152.8.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630532" comment="kernel-default-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630533" comment="kernel-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630534" comment="kernel-docs-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630535" comment="kernel-docs-html-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630536" comment="kernel-kvmsmall-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630537" comment="kernel-kvmsmall-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630538" comment="kernel-macros-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630539" comment="kernel-obs-build-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630540" comment="kernel-obs-qa-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630541" comment="kernel-preempt-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630542" comment="kernel-preempt-devel-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630543" comment="kernel-source-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630544" comment="kernel-source-vanilla-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009630545" comment="kernel-syms-5.3.18-lp152.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37600</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1440-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O37YZAXFT5P25MP6HADS7PSL7LUNUR45/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLPFQQ775XYJFXYC4GI3EPDN5KR7OLG7/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653904" comment="libblkid-devel-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653905" comment="libblkid-devel-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152861" comment="libblkid-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653906" comment="libblkid-devel-static-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152862" comment="libblkid-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653907" comment="libblkid1-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653908" comment="libblkid1-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653909" comment="libfdisk-devel-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154254" comment="libfdisk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653910" comment="libfdisk-devel-static-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154255" comment="libfdisk-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653911" comment="libfdisk1-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154114" comment="libfdisk1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653912" comment="libmount-devel-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152863" comment="libmount-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653913" comment="libmount-devel-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152864" comment="libmount-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653914" comment="libmount-devel-static-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152865" comment="libmount-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653915" comment="libmount1-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653916" comment="libmount1-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653917" comment="libsmartcols-devel-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152866" comment="libsmartcols-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653918" comment="libsmartcols-devel-static-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152867" comment="libsmartcols-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653919" comment="libsmartcols1-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653920" comment="libuuid-devel-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653921" comment="libuuid-devel-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152868" comment="libuuid-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653922" comment="libuuid-devel-static-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152869" comment="libuuid-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653923" comment="libuuid1-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653924" comment="libuuid1-32bit-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653925" comment="python3-libmount-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652924" comment="python3-libmount is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653926" comment="util-linux-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653927" comment="util-linux-lang-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653928" comment="util-linux-systemd-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653929" comment="uuidd-2.33.2-lp152.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152871" comment="uuidd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194518">SUSE bug 1194518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37701</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701</cve>
	<bugzilla href="https://bugzilla.suse.com/1190057">SUSE bug 1190057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712</cve>
	<bugzilla href="https://bugzilla.suse.com/1190056">SUSE bug 1190056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37713" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713</cve>
	<bugzilla href="https://bugzilla.suse.com/1190055">SUSE bug 1190055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009862.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHCRV6M5JSBYECPOLQFCUXBYMZFVXKCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LN5FUC4TZVB7GKLTDOBR7UQD6W4262A/" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750</cve>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653808" comment="krb5-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653809" comment="krb5-32bit-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653810" comment="krb5-client-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653811" comment="krb5-devel-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653812" comment="krb5-devel-32bit-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653813" comment="krb5-mini-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653814" comment="krb5-mini-devel-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653815" comment="krb5-plugin-kdb-ldap-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653816" comment="krb5-plugin-preauth-otp-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653817" comment="krb5-plugin-preauth-pkinit-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653818" comment="krb5-server-1.16.3-lp152.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H36LVLBVTFLQTYOKRPFVWGCDCWJQWKLY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64NXCVRRUDYD4U65CYH2ROCOGMSYF3U/" source="SUSE-SU"/>
    <description>
    A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191712">SUSE bug 1191712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633115" comment="ghostscript-9.52-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633116" comment="ghostscript-devel-9.52-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633117" comment="ghostscript-mini-9.52-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633118" comment="ghostscript-mini-devel-9.52-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633119" comment="ghostscript-x11-9.52-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633120" comment="libspectre-devel-0.2.8-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236536" comment="libspectre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009633121" comment="libspectre1-0.2.8-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236537" comment="libspectre1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37956" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37956" ref_url="https://www.suse.com/security/cve/CVE-2021-37956" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37956/">CVE-2021-37956</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37957</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37957" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37957" ref_url="https://www.suse.com/security/cve/CVE-2021-37957" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37957/">CVE-2021-37957</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37958" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37958" ref_url="https://www.suse.com/security/cve/CVE-2021-37958" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37958/">CVE-2021-37958</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37959" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37959" ref_url="https://www.suse.com/security/cve/CVE-2021-37959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37959/">CVE-2021-37959</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37960" ref_url="https://www.suse.com/security/cve/CVE-2021-37960" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37960/">CVE-2021-37960</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37961" ref_url="https://www.suse.com/security/cve/CVE-2021-37961" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37961/">CVE-2021-37961</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37962" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37962" ref_url="https://www.suse.com/security/cve/CVE-2021-37962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37962/">CVE-2021-37962</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37963</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37963" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37963" ref_url="https://www.suse.com/security/cve/CVE-2021-37963" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37963/">CVE-2021-37963</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37964" ref_url="https://www.suse.com/security/cve/CVE-2021-37964" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37964/">CVE-2021-37964</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37965" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37965" ref_url="https://www.suse.com/security/cve/CVE-2021-37965" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37965/">CVE-2021-37965</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37966" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37966" ref_url="https://www.suse.com/security/cve/CVE-2021-37966" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37966/">CVE-2021-37966</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37967" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37967" ref_url="https://www.suse.com/security/cve/CVE-2021-37967" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37967/">CVE-2021-37967</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37968" ref_url="https://www.suse.com/security/cve/CVE-2021-37968" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37968/">CVE-2021-37968</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37969</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37969" ref_url="https://www.suse.com/security/cve/CVE-2021-37969" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37969/">CVE-2021-37969</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37970</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37970" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37970" ref_url="https://www.suse.com/security/cve/CVE-2021-37970" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37970/">CVE-2021-37970</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37971" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37971" ref_url="https://www.suse.com/security/cve/CVE-2021-37971" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37971/">CVE-2021-37971</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37972" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37972" ref_url="https://www.suse.com/security/cve/CVE-2021-37972" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37972/">CVE-2021-37972</cve>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37973" ref_url="https://www.suse.com/security/cve/CVE-2021-37973" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
    <description>
    Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37973/">CVE-2021-37973</cve>
	<bugzilla href="https://bugzilla.suse.com/1191166">SUSE bug 1191166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37974" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAX3Q57Z6FBAZI5TMEFWFYPK5JXVPRKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974</cve>
	<bugzilla href="https://bugzilla.suse.com/1191204">SUSE bug 1191204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37975</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAX3Q57Z6FBAZI5TMEFWFYPK5JXVPRKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975</cve>
	<bugzilla href="https://bugzilla.suse.com/1191204">SUSE bug 1191204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAX3Q57Z6FBAZI5TMEFWFYPK5JXVPRKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976</cve>
	<bugzilla href="https://bugzilla.suse.com/1191204">SUSE bug 1191204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37977" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37977" ref_url="https://www.suse.com/security/cve/CVE-2021-37977" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37977/">CVE-2021-37977</cve>
	<bugzilla href="https://bugzilla.suse.com/1191463">SUSE bug 1191463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37978" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37978" ref_url="https://www.suse.com/security/cve/CVE-2021-37978" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37978/">CVE-2021-37978</cve>
	<bugzilla href="https://bugzilla.suse.com/1191463">SUSE bug 1191463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37979</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37979" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37979" ref_url="https://www.suse.com/security/cve/CVE-2021-37979" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37979/">CVE-2021-37979</cve>
	<bugzilla href="https://bugzilla.suse.com/1191463">SUSE bug 1191463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JKY4BZIJEZDOAALSG7OM4W3NORVRUO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980</cve>
	<bugzilla href="https://bugzilla.suse.com/1191463">SUSE bug 1191463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653871" comment="opera-80.0.4170.63-lp152.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651936" comment="chromedriver-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651937" comment="chromium-94.0.4606.81-lp152.2.132.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37982</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37982" ref_url="https://www.suse.com/security/cve/CVE-2021-37982" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37982/">CVE-2021-37982</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37983" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37983" ref_url="https://www.suse.com/security/cve/CVE-2021-37983" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37983/">CVE-2021-37983</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37985</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37985" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37985" ref_url="https://www.suse.com/security/cve/CVE-2021-37985" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37985/">CVE-2021-37985</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37986</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37986" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37986" ref_url="https://www.suse.com/security/cve/CVE-2021-37986" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37986/">CVE-2021-37986</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37988" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37988" ref_url="https://www.suse.com/security/cve/CVE-2021-37988" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37988/">CVE-2021-37988</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37989</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37989" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37990</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37990" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37990" ref_url="https://www.suse.com/security/cve/CVE-2021-37990" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37990/">CVE-2021-37990</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37991" ref_url="https://www.suse.com/security/cve/CVE-2021-37991" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37991/">CVE-2021-37991</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37992" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37993</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37993" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37994</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37994" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37994" ref_url="https://www.suse.com/security/cve/CVE-2021-37994" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37994/">CVE-2021-37994</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37995" ref_url="https://www.suse.com/security/cve/CVE-2021-37995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37995/">CVE-2021-37995</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37996</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
            <platform>openSUSE Leap 15.2 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37996" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYLHMZTJJPI73VMWKC3ARZ4PIBXUS3VM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KPG5DWW4SNUCP3CCQ2LC7L3RKCFTIAA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996</cve>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657140" comment="opera-81.0.4196.31-lp152.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653718" comment="chromedriver-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653719" comment="chromium-95.0.4638.54-lp152.2.135.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37997</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37997" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37997" ref_url="https://www.suse.com/security/cve/CVE-2021-37997" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37997/">CVE-2021-37997</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37998</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37999" ref_url="https://www.suse.com/security/cve/CVE-2021-37999" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37999/">CVE-2021-37999</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38000</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38000" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38000" ref_url="https://www.suse.com/security/cve/CVE-2021-38000" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38000/">CVE-2021-38000</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38001</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38001" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38002</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38003</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38003" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003</cve>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654476" comment="chromedriver-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654477" comment="chromium-95.0.4638.69-lp152.2.138.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38005</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38005" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38006" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38006" ref_url="https://www.suse.com/security/cve/CVE-2021-38006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38006/">CVE-2021-38006</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38007</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38007" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38008" ref_url="https://www.suse.com/security/cve/CVE-2021-38008" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38008/">CVE-2021-38008</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38009" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38010" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38011" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38011" ref_url="https://www.suse.com/security/cve/CVE-2021-38011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38011/">CVE-2021-38011</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38012" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38013" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38013" ref_url="https://www.suse.com/security/cve/CVE-2021-38013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38013/">CVE-2021-38013</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38014</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38014" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38014" ref_url="https://www.suse.com/security/cve/CVE-2021-38014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38014/">CVE-2021-38014</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38015" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38016" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38016" ref_url="https://www.suse.com/security/cve/CVE-2021-38016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38016/">CVE-2021-38016</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38017" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38018" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38018" ref_url="https://www.suse.com/security/cve/CVE-2021-38018" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38018/">CVE-2021-38018</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38019" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38020" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38020" ref_url="https://www.suse.com/security/cve/CVE-2021-38020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38020/">CVE-2021-38020</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38021" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38022" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022</cve>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38160</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2689-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XORUFH2I27QQWZXGSRUKWLXW5NX5KLXA/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189486">SUSE bug 1189486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192364">SUSE bug 1192364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193391">SUSE bug 1193391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631867" comment="cpio-2.12-lp152.5.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631868" comment="cpio-lang-2.12-lp152.5.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151390" comment="cpio-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631869" comment="cpio-mt-2.12-lp152.5.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177165" comment="cpio-mt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38198</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38205</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632903" comment="kernel-debug-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632904" comment="kernel-debug-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632905" comment="kernel-default-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632906" comment="kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632907" comment="kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632908" comment="kernel-default-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632909" comment="kernel-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632910" comment="kernel-docs-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632911" comment="kernel-docs-html-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632912" comment="kernel-kvmsmall-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632913" comment="kernel-kvmsmall-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632914" comment="kernel-macros-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632915" comment="kernel-obs-build-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632916" comment="kernel-obs-qa-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632917" comment="kernel-preempt-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632918" comment="kernel-preempt-devel-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632919" comment="kernel-source-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632920" comment="kernel-source-vanilla-5.3.18-lp152.92.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632921" comment="kernel-syms-5.3.18-lp152.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38297</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009631.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IXMAIR3G3J5JZVCA47HWXWJMD5MGNPJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIM34IG35JY2VQO7SG7B6CIKK6WJCG7Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVHY4MCTZUSRMWV4B3OCMV5DMLSKQYES/" source="SUSE-SU"/>
    <description>
    Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297</cve>
	<bugzilla href="https://bugzilla.suse.com/1191468">SUSE bug 1191468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653851" comment="go1.16-1.16.9-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653852" comment="go1.16-doc-1.16.9-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653853" comment="go1.16-race-1.16.9-lp152.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38385</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38385" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38385" ref_url="https://www.suse.com/security/cve/CVE-2021-38385" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMWWIBVBPI5X7QIC5VO3NJURIXL33ROT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHRGW223LHWDOY266A75KETVX3MXPUIF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZNA4UBO42ISVK2GMMR2H5RCFMPHLYVV/" source="SUSE-SU"/>
    <description>
    Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38385/">CVE-2021-38385</cve>
	<bugzilla href="https://bugzilla.suse.com/1189489">SUSE bug 1189489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009631336" comment="tor-0.4.6.7-lp152.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38492</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 92, Thunderbird &lt; 91.1, Thunderbird &lt; 78.14, Firefox ESR &lt; 78.14, and Firefox ESR &lt; 91.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38493</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.14, Thunderbird &lt; 78.14, and Firefox &lt; 92.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38495</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38495" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.1 and Firefox ESR &lt; 91.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38501</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652642" comment="MozillaFirefox-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652643" comment="MozillaFirefox-branding-upstream-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652644" comment="MozillaFirefox-devel-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652645" comment="MozillaFirefox-translations-common-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652646" comment="MozillaFirefox-translations-other-91.2.0-lp152.2.67.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652647" comment="rust-cbindgen-0.19.0-lp152.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38502</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38508</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38510</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3896</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3896" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39134</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39134" ref_url="https://www.suse.com/security/cve/CVE-2021-39134" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    `@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39134/">CVE-2021-39134</cve>
	<bugzilla href="https://bugzilla.suse.com/1190054">SUSE bug 1190054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
    <description>
    `@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135</cve>
	<bugzilla href="https://bugzilla.suse.com/1190053">SUSE bug 1190053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659594" comment="nodejs12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294935" comment="nodejs12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659595" comment="nodejs12-devel-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294936" comment="nodejs12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659596" comment="nodejs12-docs-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294937" comment="nodejs12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659455" comment="nodejs14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341817" comment="nodejs14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659456" comment="nodejs14-devel-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341818" comment="nodejs14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659457" comment="nodejs14-docs-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341819" comment="nodejs14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659597" comment="npm12-12.22.7-lp152.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294938" comment="npm12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659458" comment="npm14-14.18.1-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341820" comment="npm14 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39140</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39140" ref_url="https://www.suse.com/security/cve/CVE-2021-39140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39140/">CVE-2021-39140</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39141" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39141" ref_url="https://www.suse.com/security/cve/CVE-2021-39141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39141/">CVE-2021-39141</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39144</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39145" ref_url="https://www.suse.com/security/cve/CVE-2021-39145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39145/">CVE-2021-39145</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39146</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39146" ref_url="https://www.suse.com/security/cve/CVE-2021-39146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39146/">CVE-2021-39146</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39147</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39148</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39148" ref_url="https://www.suse.com/security/cve/CVE-2021-39148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39148/">CVE-2021-39148</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39149</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39149" ref_url="https://www.suse.com/security/cve/CVE-2021-39149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39149/">CVE-2021-39149</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39150</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39150" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39151</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39151" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39151" ref_url="https://www.suse.com/security/cve/CVE-2021-39151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39151/">CVE-2021-39151</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39152</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39152" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39152" ref_url="https://www.suse.com/security/cve/CVE-2021-39152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39152/">CVE-2021-39152</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39153</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39154" ref_url="https://www.suse.com/security/cve/CVE-2021-39154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39154/">CVE-2021-39154</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653781" comment="xstream-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342347" comment="xstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653782" comment="xstream-benchmark-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342348" comment="xstream-benchmark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653783" comment="xstream-javadoc-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342349" comment="xstream-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653784" comment="xstream-parent-1.4.18-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342350" comment="xstream-parent is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39251</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39251" ref_url="https://www.suse.com/security/cve/CVE-2021-39251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39251/">CVE-2021-39251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39252" ref_url="https://www.suse.com/security/cve/CVE-2021-39252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39252/">CVE-2021-39252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39253</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39253" ref_url="https://www.suse.com/security/cve/CVE-2021-39253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39253/">CVE-2021-39253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39255</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39255" ref_url="https://www.suse.com/security/cve/CVE-2021-39255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can trigger an out-of-bounds read, caused by an invalid attribute in ntfs_attr_find_in_attrdef, in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39255/">CVE-2021-39255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39256</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39256" ref_url="https://www.suse.com/security/cve/CVE-2021-39256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39256/">CVE-2021-39256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39257</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39257" ref_url="https://www.suse.com/security/cve/CVE-2021-39257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite), causing stack consumption in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39257/">CVE-2021-39257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39258</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39258" ref_url="https://www.suse.com/security/cve/CVE-2021-39258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39258/">CVE-2021-39258</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39259</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39259" ref_url="https://www.suse.com/security/cve/CVE-2021-39259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39259/">CVE-2021-39259</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39260</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39260" ref_url="https://www.suse.com/security/cve/CVE-2021-39260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39260/">CVE-2021-39260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39261</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39261" ref_url="https://www.suse.com/security/cve/CVE-2021-39261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39261/">CVE-2021-39261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39262</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39262" ref_url="https://www.suse.com/security/cve/CVE-2021-39262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39262/">CVE-2021-39262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39263</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39263" ref_url="https://www.suse.com/security/cve/CVE-2021-39263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G &lt; 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-39263/">CVE-2021-39263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632646" comment="libntfs-3g-devel-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239068" comment="libntfs-3g-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632647" comment="libntfs-3g87-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252843" comment="libntfs-3g87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632648" comment="ntfs-3g-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239070" comment="ntfs-3g is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632649" comment="ntfsprogs-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239072" comment="ntfsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009632650" comment="ntfsprogs-extra-2021.8.22-lp152.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252844" comment="ntfsprogs-extra is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39272</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39272" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009892.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1416-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKBTMGZAXDA7DYFMUAFILOUSIZ5RNGMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQSBOFKUN3D2SAYKHGH2NQW7UGR6J7P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSSYZRBZ642QLUIU2C7RUKT5PKPXQPKZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/" source="SUSE-SU"/>
    <description>
    Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660217" comment="fetchmail-6.4.22-lp152.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660218" comment="fetchmailconf-6.4.22-lp152.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631524" comment="fetchmailconf is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653895" comment="apache2-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653896" comment="apache2-devel-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653897" comment="apache2-doc-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653898" comment="apache2-event-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653899" comment="apache2-example-pages-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653900" comment="apache2-prefork-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653901" comment="apache2-utils-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653902" comment="apache2-worker-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39293</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1342-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVTWOLS4UPD33IXPVQJEU4V4GYL3Z2J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EY52N4KALEDKULS6YHUPW2C7OJTGHTS/" source="SUSE-SU"/>
    <description>
    In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293</cve>
	<bugzilla href="https://bugzilla.suse.com/1190589">SUSE bug 1190589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651575" comment="go1.16-1.16.8-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651576" comment="go1.16-doc-1.16.8-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651577" comment="go1.16-race-1.16.8-lp152.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3933" ref_url="https://www.suse.com/security/cve/CVE-2021-3933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009803.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKJUN3YRRGAS46NITMDUWNKKE4DUYDHB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ2PO5L23Z2LRC3XFHTL6XCTSPVECICH/" source="SUSE-SU"/>
    <description>
    An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t &lt; 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3933/">CVE-2021-3933</cve>
	<bugzilla href="https://bugzilla.suse.com/1192498">SUSE bug 1192498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659199" comment="libIlmImf-2_2-23-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659200" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659201" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659202" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659203" comment="openexr-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659204" comment="openexr-devel-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659205" comment="openexr-doc-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39365</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1312-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGUJWWBS4PDPSJUYSU34VIR2THULULQF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GPSQYWLYZXIWWGB3O5ZPKMPADF4ZWBO/" source="SUSE-SU"/>
    <description>
    In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365</cve>
	<bugzilla href="https://bugzilla.suse.com/1189839">SUSE bug 1189839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634488" comment="grilo-devel-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633964" comment="grilo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634489" comment="grilo-lang-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633965" comment="grilo-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634490" comment="grilo-tools-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633966" comment="grilo-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634491" comment="libgrilo-0_3-0-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633967" comment="libgrilo-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634492" comment="libgrlnet-0_3-0-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633968" comment="libgrlnet-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634493" comment="libgrlpls-0_3-0-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633969" comment="libgrlpls-0_3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634494" comment="typelib-1_0-Grl-0_3-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633970" comment="typelib-1_0-Grl-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634495" comment="typelib-1_0-GrlNet-0_3-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633971" comment="typelib-1_0-GrlNet-0_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009634496" comment="typelib-1_0-GrlPls-0_3-0.3.12-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009633972" comment="typelib-1_0-GrlPls-0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3941</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009803.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKJUN3YRRGAS46NITMDUWNKKE4DUYDHB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ2PO5L23Z2LRC3XFHTL6XCTSPVECICH/" source="SUSE-SU"/>
    <description>
    In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division operations such as `float Z = (1 - chroma.white.x - chroma.white.y) * Y / chroma.white.y;` and `chroma.green.y * (X + Z))) / d;` but the divisor is not checked for a 0 value. A specially crafted file could trigger a divide-by-zero condition which could affect the availability of programs linked with OpenEXR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659199" comment="libIlmImf-2_2-23-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659200" comment="libIlmImf-2_2-23-32bit-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659201" comment="libIlmImfUtil-2_2-23-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659202" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659203" comment="openexr-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659204" comment="openexr-devel-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659205" comment="openexr-doc-2.2.1-lp152.7.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009632.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1417-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTS45TDORJPZD3OEON7W6CTYLNX6KQ3J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IZOG455BIMQ6NKBIPOWITV4SHIG5YT7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196626">SUSE bug 1196626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653821" comment="libncurses5-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158856" comment="libncurses5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653822" comment="libncurses5-32bit-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158857" comment="libncurses5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653823" comment="libncurses6-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653824" comment="libncurses6-32bit-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158859" comment="libncurses6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653825" comment="ncurses-devel-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158861" comment="ncurses-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653826" comment="ncurses-devel-32bit-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158862" comment="ncurses-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653827" comment="ncurses-utils-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653828" comment="ncurses5-devel-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241509" comment="ncurses5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653829" comment="ncurses5-devel-32bit-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241510" comment="ncurses5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653830" comment="tack-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158864" comment="tack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653831" comment="terminfo-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653832" comment="terminfo-base-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653833" comment="terminfo-iterm-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241511" comment="terminfo-iterm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653834" comment="terminfo-screen-6.1-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241512" comment="terminfo-screen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39920</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39921</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39928</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39929</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4IHVPZT7B7SN73CHLW4TIYSYZIPKJ7D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
    <description>
    Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929</cve>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659510" comment="libwireshark14-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479977" comment="libwireshark14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659511" comment="libwiretap11-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479978" comment="libwiretap11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659512" comment="libwsutil12-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479979" comment="libwsutil12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659513" comment="wireshark-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659514" comment="wireshark-devel-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659515" comment="wireshark-ui-qt-3.4.10-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UNP5L7TX3N3YWCIHNMKXPR4ENMV7RHI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLLTDD27WXQ6WFOOCQT3PBFXVFGSQA5/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194308">SUSE bug 1194308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660082" comment="xorg-x11-server-1.20.3-lp152.8.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660083" comment="xorg-x11-server-extra-1.20.3-lp152.8.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660084" comment="xorg-x11-server-sdk-1.20.3-lp152.8.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660085" comment="xorg-x11-server-source-1.20.3-lp152.8.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660086" comment="xorg-x11-server-wayland-1.20.3-lp152.8.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661691" comment="xorg-x11-server-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661692" comment="xorg-x11-server-extra-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661693" comment="xorg-x11-server-sdk-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661694" comment="xorg-x11-server-source-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661695" comment="xorg-x11-server-wayland-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661691" comment="xorg-x11-server-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661692" comment="xorg-x11-server-extra-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661693" comment="xorg-x11-server-sdk-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661694" comment="xorg-x11-server-source-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661695" comment="xorg-x11-server-wayland-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661691" comment="xorg-x11-server-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661692" comment="xorg-x11-server-extra-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661693" comment="xorg-x11-server-sdk-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661694" comment="xorg-x11-server-source-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661695" comment="xorg-x11-server-wayland-1.20.3-lp152.8.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40330</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40330" ref_url="https://www.suse.com/security/cve/CVE-2021-40330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHADPIKH543AF7C3D6N7XU3ZL56DUAOW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXUBRXLMWBRLT5YI5UGAWTWUKG3VAM46/" source="SUSE-SU"/>
    <description>
    git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-40330/">CVE-2021-40330</cve>
	<bugzilla href="https://bugzilla.suse.com/1189992">SUSE bug 1189992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651589" comment="git-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651590" comment="git-arch-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651591" comment="git-core-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651592" comment="git-credential-gnome-keyring-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651593" comment="git-credential-libsecret-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651594" comment="git-cvs-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651595" comment="git-daemon-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651596" comment="git-doc-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651597" comment="git-email-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651598" comment="git-gui-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651599" comment="git-p4-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651600" comment="git-svn-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651601" comment="git-web-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651602" comment="gitk-2.26.2-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40346</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40346" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40346" ref_url="https://www.suse.com/security/cve/CVE-2021-40346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6TTUW6SSY2VZZGE3CPYLSNSIBVPT2RR/" source="SUSE-SU"/>
    <description>
    An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40346/">CVE-2021-40346</cve>
	<bugzilla href="https://bugzilla.suse.com/1189877">SUSE bug 1189877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009651154" comment="haproxy-2.0.14-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40438</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653895" comment="apache2-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653896" comment="apache2-devel-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653897" comment="apache2-doc-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653898" comment="apache2-event-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653899" comment="apache2-example-pages-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653900" comment="apache2-prefork-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653901" comment="apache2-utils-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653902" comment="apache2-worker-2.4.43-lp152.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652561" comment="kernel-debug-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652562" comment="kernel-debug-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652563" comment="kernel-default-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652564" comment="kernel-default-base-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652565" comment="kernel-default-base-rebuild-5.3.18-lp152.95.1.lp152.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652566" comment="kernel-default-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652567" comment="kernel-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652568" comment="kernel-docs-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652569" comment="kernel-docs-html-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652570" comment="kernel-kvmsmall-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652571" comment="kernel-kvmsmall-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652572" comment="kernel-macros-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652573" comment="kernel-obs-build-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652574" comment="kernel-obs-qa-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652575" comment="kernel-preempt-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652576" comment="kernel-preempt-devel-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652577" comment="kernel-source-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652578" comment="kernel-source-vanilla-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652579" comment="kernel-syms-5.3.18-lp152.95.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652631" comment="kmod-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652726" comment="kmod is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652632" comment="kmod-bash-completion-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652727" comment="kmod-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652633" comment="kmod-compat-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652586" comment="kmod-compat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652634" comment="libkmod-devel-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652728" comment="libkmod-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009652635" comment="libkmod2-25-lp152.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009652729" comment="libkmod2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4052</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4052" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4052" ref_url="https://www.suse.com/security/cve/CVE-2021-4052" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4052/">CVE-2021-4052</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40529" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40529" ref_url="https://www.suse.com/security/cve/CVE-2021-40529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-40529/">CVE-2021-40529</cve>
	<bugzilla href="https://bugzilla.suse.com/1190244">SUSE bug 1190244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4053</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4053" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4053" ref_url="https://www.suse.com/security/cve/CVE-2021-4053" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4053/">CVE-2021-4053</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4054</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4054" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4054" ref_url="https://www.suse.com/security/cve/CVE-2021-4054" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4054/">CVE-2021-4054</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4055</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4055" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4055" ref_url="https://www.suse.com/security/cve/CVE-2021-4055" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4055/">CVE-2021-4055</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4056" ref_url="https://www.suse.com/security/cve/CVE-2021-4056" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4056/">CVE-2021-4056</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4057</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4057" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4058</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4058" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4059" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4061</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4061" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4061" ref_url="https://www.suse.com/security/cve/CVE-2021-4061" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4061/">CVE-2021-4061</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4062</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4062" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4063</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4063" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4063" ref_url="https://www.suse.com/security/cve/CVE-2021-4063" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4063/">CVE-2021-4063</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4064</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4064" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4064" ref_url="https://www.suse.com/security/cve/CVE-2021-4064" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4064/">CVE-2021-4064</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4065</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4065" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4065" ref_url="https://www.suse.com/security/cve/CVE-2021-4065" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4065/">CVE-2021-4065</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4066</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4066" ref_url="https://www.suse.com/security/cve/CVE-2021-4066" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4066/">CVE-2021-4066</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4067</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4067" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4067" ref_url="https://www.suse.com/security/cve/CVE-2021-4067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4067/">CVE-2021-4067</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4068" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4068" ref_url="https://www.suse.com/security/cve/CVE-2021-4068" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4068/">CVE-2021-4068</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4078" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4079</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4079" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079</cve>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098</cve>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4099</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4099" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099</cve>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4100</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4100" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4100" ref_url="https://www.suse.com/security/cve/CVE-2021-4100" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4100/">CVE-2021-4100</cve>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4101</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4101" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101</cve>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4102</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4102" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJZLITO4GTLR5FP75FBCLDYZMUY2AFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102</cve>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661914" comment="chromedriver-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661915" comment="chromium-96.0.4664.110-lp152.2.143.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4104</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHZ7COSTMBF33SO76DMFLY7V62XQUQLS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BQ3YNECTWF6XMIQDZ7C5QEDQ3QPQT4W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTBP7J2BY2P4Y4VVPTAERSBRBHRHKIDZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U355AEBE4AWYTPUPBMC3XAO6XBTWFRBL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
    <description>
    JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193978">SUSE bug 1193978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194016">SUSE bug 1194016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661704" comment="log4j12-1.2.17-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660223" comment="log4j12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661705" comment="log4j12-javadoc-1.2.17-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660224" comment="log4j12-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661706" comment="log4j12-manual-1.2.17-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660225" comment="log4j12-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661707" comment="log4j12-mini-1.2.17-lp152.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009661801" comment="log4j12-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41079</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41079" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KJLIWWFI3SIH2EDCVQ6J6NITH5JTGPE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JSV3IQW2IZ4TG73GE2HYEJN52YYLT3T/" source="SUSE-SU"/>
    <description>
    Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079</cve>
	<bugzilla href="https://bugzilla.suse.com/1190558">SUSE bug 1190558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657141" comment="tomcat-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657142" comment="tomcat-admin-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657143" comment="tomcat-docs-webapp-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657144" comment="tomcat-el-3_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657145" comment="tomcat-embed-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657146" comment="tomcat-javadoc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657147" comment="tomcat-jsp-2_3-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657148" comment="tomcat-jsvc-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657149" comment="tomcat-lib-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657150" comment="tomcat-servlet-4_0-api-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657151" comment="tomcat-webapps-9.0.36-lp152.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41089</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089</cve>
	<bugzilla href="https://bugzilla.suse.com/1191015">SUSE bug 1191015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41091</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091</cve>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191434">SUSE bug 1191434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41092</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41092" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092</cve>
	<bugzilla href="https://bugzilla.suse.com/1191334">SUSE bug 1191334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41103</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41103" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103</cve>
	<bugzilla href="https://bugzilla.suse.com/1191121">SUSE bug 1191121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653799" comment="containerd-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653800" comment="containerd-ctr-1.4.11-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653801" comment="docker-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653802" comment="docker-bash-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653803" comment="docker-fish-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653804" comment="docker-zsh-completion-20.10.9_ce-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653805" comment="runc-1.0.2-lp152.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O63MYUSWLBDBHWT5CBFN7YN5WUMCT6NS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3472-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXL4FA3WICXGFNYWHOG3GKOXZERBN6TL/" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133</cve>
	<bugzilla href="https://bugzilla.suse.com/1191507">SUSE bug 1191507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653775" comment="flatpak-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171006" comment="flatpak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653776" comment="flatpak-devel-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171008" comment="flatpak-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653777" comment="flatpak-zsh-completion-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350833" comment="flatpak-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653778" comment="libflatpak0-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171009" comment="libflatpak0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653779" comment="system-user-flatpak-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009350838" comment="system-user-flatpak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653780" comment="typelib-1_0-Flatpak-1_0-1.10.5-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171010" comment="typelib-1_0-Flatpak-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41177" ref_url="https://www.suse.com/security/cve/CVE-2021-41177" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPS4NA73653ZFLPRD3JJVTUZZ4PYGDUS/" source="SUSE-SU"/>
    <description>
    Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-41177/">CVE-2021-41177</cve>
	<bugzilla href="https://bugzilla.suse.com/1192031">SUSE bug 1192031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660993" comment="nextcloud-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660994" comment="nextcloud-apache-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41178</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41178" ref_url="https://www.suse.com/security/cve/CVE-2021-41178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPS4NA73653ZFLPRD3JJVTUZZ4PYGDUS/" source="SUSE-SU"/>
    <description>
    Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-41178/">CVE-2021-41178</cve>
	<bugzilla href="https://bugzilla.suse.com/1192030">SUSE bug 1192030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660993" comment="nextcloud-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660994" comment="nextcloud-apache-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41179</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41179" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41179" ref_url="https://www.suse.com/security/cve/CVE-2021-41179" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPS4NA73653ZFLPRD3JJVTUZZ4PYGDUS/" source="SUSE-SU"/>
    <description>
    Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-41179/">CVE-2021-41179</cve>
	<bugzilla href="https://bugzilla.suse.com/1192028">SUSE bug 1192028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660993" comment="nextcloud-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660994" comment="nextcloud-apache-20.0.14-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342908" comment="nextcloud-apache is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41259</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41259" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41259" ref_url="https://www.suse.com/security/cve/CVE-2021-41259" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1585-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJ5ONFKNTXDNF6QISPFWOXZML6ZNYM6W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNE5YZATRXNKKPOEPNHCU3YODCFQM7H/" source="SUSE-SU"/>
    <description>
    Nim is a systems programming language with a focus on efficiency, expressiveness, and elegance. In affected versions the uri.parseUri function which may be used to validate URIs accepts null bytes in the input URI. This behavior could be used to bypass URI validation. For example: parseUri("http://localhost\0hello").hostname is set to "localhost\0hello". Additionally, httpclient.getContent accepts null bytes in the input URL and ignores any data after the first null byte. Example: getContent("http://localhost\0hello") makes a request to localhost:80. An attacker can use a null bytes to bypass the check and mount a SSRF attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-41259/">CVE-2021-41259</cve>
	<bugzilla href="https://bugzilla.suse.com/1192712">SUSE bug 1192712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659943" comment="nim-1.2.12-lp152.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351816" comment="nim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41771" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLB2XVI2D26YAVC7GRXSA47KJWR52UCR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRORBGLIRSYNYTIE3EARJHAXYB2X5YQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHZ4EPZFI4C6TOOTOETZZVUOYMZB3YGR/" source="SUSE-SU"/>
    <description>
    ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771</cve>
	<bugzilla href="https://bugzilla.suse.com/1192377">SUSE bug 1192377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659210" comment="go1.16-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659211" comment="go1.16-doc-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659212" comment="go1.16-race-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41772" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLB2XVI2D26YAVC7GRXSA47KJWR52UCR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRORBGLIRSYNYTIE3EARJHAXYB2X5YQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHZ4EPZFI4C6TOOTOETZZVUOYMZB3YGR/" source="SUSE-SU"/>
    <description>
    Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772</cve>
	<bugzilla href="https://bugzilla.suse.com/1192378">SUSE bug 1192378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659210" comment="go1.16-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659211" comment="go1.16-doc-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659212" comment="go1.16-race-1.16.10-lp152.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41990</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41990" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990</cve>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653767" comment="strongswan-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653768" comment="strongswan-doc-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653769" comment="strongswan-hmac-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653770" comment="strongswan-ipsec-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653771" comment="strongswan-libs0-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653772" comment="strongswan-mysql-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653773" comment="strongswan-nm-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653774" comment="strongswan-sqlite-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" source="SUSE-SU"/>
    <description>
    The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192640">SUSE bug 1192640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653767" comment="strongswan-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653768" comment="strongswan-doc-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653769" comment="strongswan-hmac-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653770" comment="strongswan-ipsec-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653771" comment="strongswan-libs0-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653772" comment="strongswan-mysql-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653773" comment="strongswan-nm-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653774" comment="strongswan-sqlite-5.8.2-lp152.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191660">SUSE bug 1191660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42072</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42072" ref_url="https://www.suse.com/security/cve/CVE-2021-42072" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/74GXCIF4KQYNWDBG745K5PJQT5VK2BHK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HJIFZZMEQZI47KRZYVOPBZN725K3KS3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42072/">CVE-2021-42072</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657381" comment="barrier-2.4.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657382" comment="barrier is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42073</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42073" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42073" ref_url="https://www.suse.com/security/cve/CVE-2021-42073" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/74GXCIF4KQYNWDBG745K5PJQT5VK2BHK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HJIFZZMEQZI47KRZYVOPBZN725K3KS3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42073/">CVE-2021-42073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657381" comment="barrier-2.4.0-lp152.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657382" comment="barrier is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42096</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42096" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSDRER3UF4R57ILYOQY7J63PNAP2LA73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJE7PQHJDJVNG4MP75G5GY65ABFE2RAP/" source="SUSE-SU"/>
    <description>
    GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096</cve>
	<bugzilla href="https://bugzilla.suse.com/1191959">SUSE bug 1191959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653894" comment="mailman-2.1.35-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42097</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42097" ref_url="https://www.suse.com/security/cve/CVE-2021-42097" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSDRER3UF4R57ILYOQY7J63PNAP2LA73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJE7PQHJDJVNG4MP75G5GY65ABFE2RAP/" source="SUSE-SU"/>
    <description>
    GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42097/">CVE-2021-42097</cve>
	<bugzilla href="https://bugzilla.suse.com/1191960">SUSE bug 1191960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009653894" comment="mailman-2.1.35-lp152.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192444">SUSE bug 1192444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42260</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42260" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42260" ref_url="https://www.suse.com/security/cve/CVE-2021-42260" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F2M3VLHPBVPXWEAQR5CPGGUOGBI3B2GJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MO2YQSAKB3PM3TWSYUR2JCZND3ENJVZ/" source="SUSE-SU"/>
    <description>
    TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42260/">CVE-2021-42260</cve>
	<bugzilla href="https://bugzilla.suse.com/1191576">SUSE bug 1191576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656676" comment="libtinyxml0-2.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654662" comment="libtinyxml0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656677" comment="tinyxml-devel-2.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654663" comment="tinyxml-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656678" comment="tinyxml-docs-2.6.2-lp152.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009654664" comment="tinyxml-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQY7XF64DFNLXMA2OH345AZSHGVVPWBR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAIZQAAKIJLME5Z3MKND2JGJ5CQPRYZD/" source="SUSE-SU"/>
    <description>
    BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654238" comment="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654239" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654240" comment="libwebkit2gtk-4_0-37-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654241" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654242" comment="libwebkit2gtk3-lang-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654243" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654244" comment="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654245" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654246" comment="webkit-jsc-4-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654247" comment="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654248" comment="webkit2gtk3-devel-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009654249" comment="webkit2gtk3-minibrowser-2.32.4-lp152.2.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42771" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009967.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAKYSLN4RPESEDQ7LN7KPRMYQUFA4SYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3M6C27L6BK2YIQKO3YT5OHAJOGRYCEHB/" source="SUSE-SU"/>
    <description>
    Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771</cve>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659459" comment="python-Babel-doc-2.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659238" comment="python-Babel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659460" comment="python2-Babel-2.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659239" comment="python2-Babel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659461" comment="python3-Babel-2.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659240" comment="python3-Babel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659462" comment="python3-Babel-doc-2.8.0-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659241" comment="python3-Babel-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656708" comment="kernel-debug-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656709" comment="kernel-debug-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656710" comment="kernel-default-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656711" comment="kernel-default-base-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656712" comment="kernel-default-base-rebuild-5.3.18-lp152.102.1.lp152.8.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656713" comment="kernel-default-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656714" comment="kernel-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656715" comment="kernel-docs-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656716" comment="kernel-docs-html-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656717" comment="kernel-kvmsmall-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656718" comment="kernel-kvmsmall-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656719" comment="kernel-macros-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656720" comment="kernel-obs-build-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656721" comment="kernel-obs-qa-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656722" comment="kernel-preempt-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656723" comment="kernel-preempt-devel-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656724" comment="kernel-source-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656725" comment="kernel-source-vanilla-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009656726" comment="kernel-syms-5.3.18-lp152.102.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43389</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657894" comment="kernel-debug-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657895" comment="kernel-debug-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657896" comment="kernel-default-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657897" comment="kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657898" comment="kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291400" comment="kernel-default-base-rebuild is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657899" comment="kernel-default-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657900" comment="kernel-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657901" comment="kernel-docs-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657902" comment="kernel-docs-html-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657903" comment="kernel-kvmsmall-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657904" comment="kernel-kvmsmall-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657905" comment="kernel-macros-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657906" comment="kernel-obs-build-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657907" comment="kernel-obs-qa-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657908" comment="kernel-preempt-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291401" comment="kernel-preempt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657909" comment="kernel-preempt-devel-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291402" comment="kernel-preempt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657910" comment="kernel-source-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657911" comment="kernel-source-vanilla-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009657912" comment="kernel-syms-5.3.18-lp152.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659466" comment="libfreebl3-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659467" comment="libfreebl3-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659468" comment="libfreebl3-hmac-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659469" comment="libfreebl3-hmac-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659470" comment="libsoftokn3-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659471" comment="libsoftokn3-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659472" comment="libsoftokn3-hmac-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659473" comment="libsoftokn3-hmac-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659474" comment="mozilla-nss-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659475" comment="mozilla-nss-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659476" comment="mozilla-nss-certs-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659477" comment="mozilla-nss-certs-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659478" comment="mozilla-nss-devel-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659479" comment="mozilla-nss-sysinit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659480" comment="mozilla-nss-sysinit-32bit-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659481" comment="mozilla-nss-tools-3.68.1-lp152.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird &lt; 91.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43546</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659598" comment="MozillaFirefox-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659599" comment="MozillaFirefox-branding-upstream-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659600" comment="MozillaFirefox-devel-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659601" comment="MozillaFirefox-translations-common-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659602" comment="MozillaFirefox-translations-other-91.4.0-lp152.2.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661935" comment="MozillaThunderbird-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661936" comment="MozillaThunderbird-translations-common-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661937" comment="MozillaThunderbird-translations-other-91.4.0-lp152.2.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:27-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1569-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B57NW5VYILA46TZMVY3NWIAZTPRTGTXJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R45QGO5IGOQU6FDWBSNSZHXXXTFJHN5O/" source="SUSE-SU"/>
    <description>
    GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659516" comment="gmp-devel-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281482" comment="gmp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659517" comment="gmp-devel-32bit-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281483" comment="gmp-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659518" comment="libgmp10-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281484" comment="libgmp10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659519" comment="libgmp10-32bit-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281485" comment="libgmp10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659520" comment="libgmpxx4-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281486" comment="libgmpxx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009659521" comment="libgmpxx4-32bit-6.1.2-lp152.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281487" comment="libgmpxx4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43784</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCIUJE3F5UEWI5TYYL5CQ7SCQZU5V76Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6DD7LA7CG2OYZJT2SOA3MHVO7GOW3ANO/" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784</cve>
	<bugzilla href="https://bugzilla.suse.com/1193436">SUSE bug 1193436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661853" comment="runc-1.0.3-lp152.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228" source="SUSE CVE"/>
		<reference ref_id="BLOG-LOG4SHELL" ref_url="https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="NEUVECTOR-STATEMENT-LOG4J" ref_url="https://blog.neuvector.com/article/apache-log4j-2-cve-2021-44228" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009912.html" source="SUSE-SU"/>
		<reference ref_id="TID000020526" ref_url="https://www.suse.com/support/kb/doc/?id=000020526" source="SUSE-SU"/>
		<reference ref_id="TID000020647" ref_url="https://www.suse.com/support/kb/doc/?id=000020647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHVQSNSG4OZ336XWLNWGUL3TQE2ZZODK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MM3SIUADOVLPKKTSRFXAGFZXOZH63CFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLSFAYMV5DOWQ3EO5252SX7QTCHNCWGK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKG4SHDRVYYGSRQNKBCCH6YJUQX2D54K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KJHAK7MUO47JBMMPGGMJ3EKQX3P7TAO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDZ2MV2SSNKVN4EVV5AQ3HGQ2G4U2JHS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PCJYMTCVZUNMRYAU55HAMIA6VB3BO7SY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GICANZVVUJZMKRG5INZ4A2FGAEWOEJQD/" source="SUSE-SU"/>
    <description>
    Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228</cve>
	<bugzilla href="https://bugzilla.suse.com/1193611">SUSE bug 1193611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193743">SUSE bug 1193743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193795">SUSE bug 1193795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194016">SUSE bug 1194016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194123">SUSE bug 1194123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660985" comment="disruptor-3.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660171" comment="disruptor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660986" comment="disruptor-javadoc-3.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660172" comment="disruptor-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660987" comment="jakarta-servlet-5.0.0-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660173" comment="jakarta-servlet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660988" comment="jakarta-servlet-javadoc-5.0.0-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660174" comment="jakarta-servlet-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660989" comment="log4j-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275808" comment="log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660990" comment="log4j-javadoc-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275809" comment="log4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660991" comment="log4j-jcl-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659607" comment="log4j-jcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660992" comment="log4j-slf4j-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659608" comment="log4j-slf4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661708" comment="logback-1.2.8-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660226" comment="logback is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661709" comment="logback-access-1.2.8-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660227" comment="logback-access is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661710" comment="logback-examples-1.2.8-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660228" comment="logback-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661711" comment="logback-javadoc-1.2.8-lp152.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660229" comment="logback-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44540" ref_url="https://www.suse.com/security/cve/CVE-2021-44540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYO5MMUZFNF4G2ZDKAE76JYKJCV2JPWK/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44540/">CVE-2021-44540</cve>
	<bugzilla href="https://bugzilla.suse.com/1193584">SUSE bug 1193584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662414" comment="privoxy-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662415" comment="privoxy-doc-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44541" ref_url="https://www.suse.com/security/cve/CVE-2021-44541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYO5MMUZFNF4G2ZDKAE76JYKJCV2JPWK/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-44541/">CVE-2021-44541</cve>
	<bugzilla href="https://bugzilla.suse.com/1193584">SUSE bug 1193584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662414" comment="privoxy-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662415" comment="privoxy-doc-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44542" ref_url="https://www.suse.com/security/cve/CVE-2021-44542" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYO5MMUZFNF4G2ZDKAE76JYKJCV2JPWK/" source="SUSE-SU"/>
    <description>
    A memory leak vulnerability was found in Privoxy when handling errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-44542/">CVE-2021-44542</cve>
	<bugzilla href="https://bugzilla.suse.com/1193584">SUSE bug 1193584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662414" comment="privoxy-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662415" comment="privoxy-doc-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44543" ref_url="https://www.suse.com/security/cve/CVE-2021-44543" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYO5MMUZFNF4G2ZDKAE76JYKJCV2JPWK/" source="SUSE-SU"/>
    <description>
    An XSS vulnerability was found in Privoxy which was fixed in cgi_error_no_template() by encode the template name when Privoxy is configured to servce the user-manual itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-44543/">CVE-2021-44543</cve>
	<bugzilla href="https://bugzilla.suse.com/1193584">SUSE bug 1193584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662414" comment="privoxy-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662415" comment="privoxy-doc-3.0.33-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44716</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44716" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1626-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W3FKE7L66ATNR7X2EAUWUFKP5BK5SZM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOMQPXAJ4U3LE4RVZJYCTCHSVMZXVS6Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSVRDOAVYBVEWAKYWYYNOIQSYE4FHHAJ/" source="SUSE-SU"/>
    <description>
    net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661854" comment="go1.16-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661855" comment="go1.16-doc-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661856" comment="go1.16-race-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44717</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44717" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1626-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W3FKE7L66ATNR7X2EAUWUFKP5BK5SZM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOMQPXAJ4U3LE4RVZJYCTCHSVMZXVS6Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSVRDOAVYBVEWAKYWYYNOIQSYE4FHHAJ/" source="SUSE-SU"/>
    <description>
    Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661854" comment="go1.16-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623998" comment="go1.16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661855" comment="go1.16-doc-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623999" comment="go1.16-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661856" comment="go1.16-race-1.16.12-lp152.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624000" comment="go1.16-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44832</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44832" ref_url="https://www.suse.com/security/cve/CVE-2021-44832" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:4208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD3TW7GD6PF3ZSKL2TJG3Z462FFFLJND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YBITTL424FAEN3BI2PM3NGBMPREUS3P4/" source="SUSE-SU"/>
    <description>
    Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44832/">CVE-2021-44832</cve>
	<bugzilla href="https://bugzilla.suse.com/1194127">SUSE bug 1194127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662447" comment="log4j-2.17.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275808" comment="log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662448" comment="log4j-javadoc-2.17.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275809" comment="log4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662449" comment="log4j-jcl-2.17.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659607" comment="log4j-jcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662450" comment="log4j-slf4j-2.17.0-lp152.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659608" comment="log4j-slf4j is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44847" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44847" ref_url="https://www.suse.com/security/cve/CVE-2021-44847" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MUGBIA3IOPBRCHCVWXL5KMYQ6TB5Z5XI/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-44847/">CVE-2021-44847</cve>
	<bugzilla href="https://bugzilla.suse.com/1193667">SUSE bug 1193667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662416" comment="c-toxcore-0.2.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662417" comment="c-toxcore is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662418" comment="c-toxcore-daemon-0.2.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662419" comment="c-toxcore-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662420" comment="c-toxcore-devel-0.2.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662421" comment="c-toxcore-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009662422" comment="libtoxcore2-0.2.13-lp152.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662423" comment="libtoxcore2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45046</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45046" ref_url="https://www.suse.com/security/cve/CVE-2021-45046" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLSFAYMV5DOWQ3EO5252SX7QTCHNCWGK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PCJYMTCVZUNMRYAU55HAMIA6VB3BO7SY/" source="SUSE-SU"/>
    <description>
    It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45046/">CVE-2021-45046</cve>
	<bugzilla href="https://bugzilla.suse.com/1193743">SUSE bug 1193743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660985" comment="disruptor-3.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660171" comment="disruptor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660986" comment="disruptor-javadoc-3.4.4-lp152.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660172" comment="disruptor-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660987" comment="jakarta-servlet-5.0.0-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660173" comment="jakarta-servlet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660988" comment="jakarta-servlet-javadoc-5.0.0-lp152.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009660174" comment="jakarta-servlet-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660989" comment="log4j-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275808" comment="log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660990" comment="log4j-javadoc-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275809" comment="log4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660991" comment="log4j-jcl-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659607" comment="log4j-jcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009660992" comment="log4j-slf4j-2.16.0-lp152.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659608" comment="log4j-slf4j is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45105" ref_url="https://www.suse.com/security/cve/CVE-2021-45105" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LEXBDKT4RJAGPFECN424ZRWUCLSEVT5K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NGNGOILLVCJD7VSJJU7BEDG6ERFOONG6/" source="SUSE-SU"/>
    <description>
    Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-22"/>
	<updated date="2022-05-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45105/">CVE-2021-45105</cve>
	<bugzilla href="https://bugzilla.suse.com/1193887">SUSE bug 1193887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193888">SUSE bug 1193888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009290409" comment="openSUSE Leap 15.2 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661687" comment="log4j-2.17.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275808" comment="log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661688" comment="log4j-javadoc-2.17.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275809" comment="log4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661689" comment="log4j-jcl-2.17.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659607" comment="log4j-jcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009661690" comment="log4j-slf4j-2.17.0-lp152.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659608" comment="log4j-slf4j is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629523" version="1" comment="fastjar is &lt;0.98-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627142" version="1" comment="fastjar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290409" version="1" comment="openSUSE-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613806" version="1" comment="cobbler is &lt;3.1.2-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229446" version="1" comment="cobbler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613807" version="1" comment="cobbler-tests is &lt;3.1.2-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229447" version="1" comment="cobbler-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613808" version="1" comment="cobbler-web is &lt;3.1.2-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229448" version="1" comment="cobbler-web is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653806" version="1" comment="busybox is &lt;1.26.2-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152555" version="1" comment="busybox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653807" version="1" comment="busybox-static is &lt;1.26.2-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653584" version="1" comment="busybox-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612170" version="1" comment="perl-DBI is &lt;1.642-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293432" version="1" comment="perl-DBI is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611949" version="1" comment="apache-commons-httpclient is &lt;3.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151783" version="1" comment="apache-commons-httpclient is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611950" version="1" comment="apache-commons-httpclient-demo is &lt;3.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298607" version="1" comment="apache-commons-httpclient-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611951" version="1" comment="apache-commons-httpclient-javadoc is &lt;3.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298608" version="1" comment="apache-commons-httpclient-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611952" version="1" comment="apache-commons-httpclient-manual is &lt;3.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298609" version="1" comment="apache-commons-httpclient-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625515" version="1" comment="libsqlite3-0 is &lt;3.36.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625516" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153746" version="1" comment="libsqlite3-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625517" version="1" comment="sqlite3 is &lt;3.36.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153747" version="1" comment="sqlite3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625518" version="1" comment="sqlite3-devel is &lt;3.36.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153748" version="1" comment="sqlite3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625519" version="1" comment="sqlite3-doc is &lt;3.36.0-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153749" version="1" comment="sqlite3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612155" version="1" comment="wpa_supplicant is &lt;2.9-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612156" version="1" comment="wpa_supplicant-gui is &lt;2.9-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152146" version="1" comment="wpa_supplicant-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615043" version="1" comment="pam_radius is &lt;1.4.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009478582" version="1" comment="pam_radius is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615044" version="1" comment="pam_radius-32bit is &lt;1.4.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009478583" version="1" comment="pam_radius-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659492" version="1" comment="glibc is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659493" version="1" comment="glibc-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151369" version="1" comment="glibc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659494" version="1" comment="glibc-devel is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659495" version="1" comment="glibc-devel-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152566" version="1" comment="glibc-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659496" version="1" comment="glibc-devel-static is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152567" version="1" comment="glibc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659497" version="1" comment="glibc-devel-static-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152568" version="1" comment="glibc-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659498" version="1" comment="glibc-extra is &lt;2.26-lp152.26.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151371" version="1" comment="glibc-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659499" version="1" comment="glibc-html is &lt;2.26-lp152.26.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152569" version="1" comment="glibc-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659500" version="1" comment="glibc-i18ndata is &lt;2.26-lp152.26.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152570" version="1" comment="glibc-i18ndata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659501" version="1" comment="glibc-info is &lt;2.26-lp152.26.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151372" version="1" comment="glibc-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659502" version="1" comment="glibc-locale is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659503" version="1" comment="glibc-locale-base is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659504" version="1" comment="glibc-locale-base-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251613" version="1" comment="glibc-locale-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659505" version="1" comment="glibc-profile is &lt;2.26-lp152.26.12.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152572" version="1" comment="glibc-profile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659506" version="1" comment="glibc-profile-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152573" version="1" comment="glibc-profile-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659507" version="1" comment="glibc-utils is &lt;2.26-lp152.26.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152575" version="1" comment="glibc-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659508" version="1" comment="glibc-utils-32bit is &lt;2.26-lp152.26.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152576" version="1" comment="glibc-utils-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659509" version="1" comment="nscd is &lt;2.26-lp152.26.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151375" version="1" comment="nscd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656595" version="1" comment="ctdb is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152996" version="1" comment="ctdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656596" version="1" comment="ctdb-pcp-pmda is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233089" version="1" comment="ctdb-pcp-pmda is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656597" version="1" comment="ctdb-tests is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152998" version="1" comment="ctdb-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656598" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151262" version="1" comment="libdcerpc-binding0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656599" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151263" version="1" comment="libdcerpc-binding0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656600" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152727" version="1" comment="libdcerpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656601" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152728" version="1" comment="libdcerpc-samr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656602" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152729" version="1" comment="libdcerpc-samr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656603" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152730" version="1" comment="libdcerpc-samr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656604" version="1" comment="libdcerpc0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151264" version="1" comment="libdcerpc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656605" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151265" version="1" comment="libdcerpc0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656606" version="1" comment="libndr-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152735" version="1" comment="libndr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656607" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152736" version="1" comment="libndr-krb5pac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656608" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151268" version="1" comment="libndr-krb5pac0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656609" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151269" version="1" comment="libndr-krb5pac0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656610" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152737" version="1" comment="libndr-nbt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656611" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151270" version="1" comment="libndr-nbt0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656612" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151271" version="1" comment="libndr-nbt0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656613" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152738" version="1" comment="libndr-standard-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656614" version="1" comment="libndr-standard0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151272" version="1" comment="libndr-standard0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656615" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151273" version="1" comment="libndr-standard0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656616" version="1" comment="libndr0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151274" version="1" comment="libndr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656617" version="1" comment="libndr0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151275" version="1" comment="libndr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656618" version="1" comment="libnetapi-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152739" version="1" comment="libnetapi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656619" version="1" comment="libnetapi-devel-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287505" version="1" comment="libnetapi-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656620" version="1" comment="libnetapi0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151276" version="1" comment="libnetapi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656621" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151277" version="1" comment="libnetapi0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656622" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152742" version="1" comment="libsamba-credentials-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656623" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151279" version="1" comment="libsamba-credentials0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656624" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151280" version="1" comment="libsamba-credentials0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656625" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154222" version="1" comment="libsamba-errors-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656626" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154085" version="1" comment="libsamba-errors0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656627" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154086" version="1" comment="libsamba-errors0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656628" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152743" version="1" comment="libsamba-hostconfig-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656629" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151281" version="1" comment="libsamba-hostconfig0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656630" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151282" version="1" comment="libsamba-hostconfig0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656631" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152744" version="1" comment="libsamba-passdb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656632" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151283" version="1" comment="libsamba-passdb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656633" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151284" version="1" comment="libsamba-passdb0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656634" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152745" version="1" comment="libsamba-policy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656635" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266818" version="1" comment="libsamba-policy-python3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656636" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266819" version="1" comment="libsamba-policy0-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656637" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266820" version="1" comment="libsamba-policy0-python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656638" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152748" version="1" comment="libsamba-util-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656639" version="1" comment="libsamba-util0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151285" version="1" comment="libsamba-util0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656640" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151286" version="1" comment="libsamba-util0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656641" version="1" comment="libsamdb-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152749" version="1" comment="libsamdb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656642" version="1" comment="libsamdb0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151287" version="1" comment="libsamdb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656643" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151288" version="1" comment="libsamdb0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656644" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151289" version="1" comment="libsmbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656645" version="1" comment="libsmbclient0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151292" version="1" comment="libsmbclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656646" version="1" comment="libsmbclient0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152751" version="1" comment="libsmbclient0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656647" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152752" version="1" comment="libsmbconf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656648" version="1" comment="libsmbconf0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151293" version="1" comment="libsmbconf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656649" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151294" version="1" comment="libsmbconf0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656650" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152753" version="1" comment="libsmbldap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656651" version="1" comment="libsmbldap2 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177162" version="1" comment="libsmbldap2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656652" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233090" version="1" comment="libsmbldap2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656653" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152761" version="1" comment="libtevent-util-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656654" version="1" comment="libtevent-util0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151297" version="1" comment="libtevent-util0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656655" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151298" version="1" comment="libtevent-util0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656656" version="1" comment="libwbclient-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152764" version="1" comment="libwbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656657" version="1" comment="libwbclient0 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151299" version="1" comment="libwbclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656658" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151300" version="1" comment="libwbclient0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656659" version="1" comment="samba is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151301" version="1" comment="samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656660" version="1" comment="samba-ad-dc is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266821" version="1" comment="samba-ad-dc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656661" version="1" comment="samba-ad-dc-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266822" version="1" comment="samba-ad-dc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656662" version="1" comment="samba-ceph is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162650" version="1" comment="samba-ceph is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656663" version="1" comment="samba-client is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151303" version="1" comment="samba-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656664" version="1" comment="samba-client-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151304" version="1" comment="samba-client-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656665" version="1" comment="samba-core-devel is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152775" version="1" comment="samba-core-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656666" version="1" comment="samba-doc is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151305" version="1" comment="samba-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656667" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177163" version="1" comment="samba-dsdb-modules is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656668" version="1" comment="samba-libs is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151306" version="1" comment="samba-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656669" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151307" version="1" comment="samba-libs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656670" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266825" version="1" comment="samba-libs-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656671" version="1" comment="samba-libs-python3-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266826" version="1" comment="samba-libs-python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656672" version="1" comment="samba-python3 is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266827" version="1" comment="samba-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656673" version="1" comment="samba-test is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152778" version="1" comment="samba-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656674" version="1" comment="samba-winbind is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151308" version="1" comment="samba-winbind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656675" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.308.666c63d4eea-lp152.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151309" version="1" comment="samba-winbind-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614674" version="1" comment="jhead is &lt;3.06.0.1-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151155" version="1" comment="jhead is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613696" version="1" comment="froxlor is &lt;0.10.23-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347739" version="1" comment="froxlor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614619" version="1" comment="nagios is &lt;4.4.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151576" version="1" comment="nagios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614620" version="1" comment="nagios-contrib is &lt;4.4.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281477" version="1" comment="nagios-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614621" version="1" comment="nagios-devel is &lt;4.4.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281478" version="1" comment="nagios-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614622" version="1" comment="nagios-theme-exfoliation is &lt;4.4.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281479" version="1" comment="nagios-theme-exfoliation is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614623" version="1" comment="nagios-www is &lt;4.4.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151577" version="1" comment="nagios-www is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614624" version="1" comment="nagios-www-dch is &lt;4.4.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281480" version="1" comment="nagios-www-dch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610356" version="1" comment="perl-XML-Twig is &lt;3.52-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289040" version="1" comment="perl-XML-Twig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611193" version="1" comment="jasper is &lt;2.0.14-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151131" version="1" comment="jasper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611194" version="1" comment="libjasper-devel is &lt;2.0.14-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151132" version="1" comment="libjasper-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611195" version="1" comment="libjasper4 is &lt;2.0.14-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177124" version="1" comment="libjasper4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611196" version="1" comment="libjasper4-32bit is &lt;2.0.14-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252842" version="1" comment="libjasper4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614561" version="1" comment="exim is &lt;4.94.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153580" version="1" comment="exim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614562" version="1" comment="eximon is &lt;4.94.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153581" version="1" comment="eximon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614563" version="1" comment="eximstats-html is &lt;4.94.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153582" version="1" comment="eximstats-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610159" version="1" comment="knot is &lt;1.6.8-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177609" version="1" comment="knot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615022" version="1" comment="snakeyaml is &lt;1.28-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477984" version="1" comment="snakeyaml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615023" version="1" comment="snakeyaml-javadoc is &lt;1.28-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477985" version="1" comment="snakeyaml-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610112" version="1" comment="LibVNCServer-devel is &lt;0.9.10-lp152.9.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152205" version="1" comment="LibVNCServer-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610113" version="1" comment="libvncclient0 is &lt;0.9.10-lp152.9.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152206" version="1" comment="libvncclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610114" version="1" comment="libvncserver0 is &lt;0.9.10-lp152.9.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152207" version="1" comment="libvncserver0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612041" version="1" comment="libraptor-devel is &lt;2.0.15-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299308" version="1" comment="libraptor-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612042" version="1" comment="libraptor2-0 is &lt;2.0.15-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151673" version="1" comment="libraptor2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612043" version="1" comment="libraptor2-0-32bit is &lt;2.0.15-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299309" version="1" comment="libraptor2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612044" version="1" comment="raptor is &lt;2.0.15-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299310" version="1" comment="raptor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611584" version="1" comment="bind is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151203" version="1" comment="bind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611585" version="1" comment="bind-chrootenv is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151204" version="1" comment="bind-chrootenv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611586" version="1" comment="bind-devel is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153102" version="1" comment="bind-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611587" version="1" comment="bind-devel-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256539" version="1" comment="bind-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611588" version="1" comment="bind-doc is &lt;9.16.6-lp152.14.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151205" version="1" comment="bind-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611589" version="1" comment="bind-utils is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151207" version="1" comment="bind-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611590" version="1" comment="libbind9-1600 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296220" version="1" comment="libbind9-1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611591" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296221" version="1" comment="libbind9-1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611592" version="1" comment="libdns1605 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296222" version="1" comment="libdns1605 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611593" version="1" comment="libdns1605-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296223" version="1" comment="libdns1605-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611594" version="1" comment="libirs-devel is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256550" version="1" comment="libirs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611595" version="1" comment="libirs1601 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296224" version="1" comment="libirs1601 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611596" version="1" comment="libirs1601-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296225" version="1" comment="libirs1601-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611597" version="1" comment="libisc1606 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296226" version="1" comment="libisc1606 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611598" version="1" comment="libisc1606-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296227" version="1" comment="libisc1606-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611599" version="1" comment="libisccc1600 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296228" version="1" comment="libisccc1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611600" version="1" comment="libisccc1600-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296229" version="1" comment="libisccc1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611601" version="1" comment="libisccfg1600 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296230" version="1" comment="libisccfg1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611602" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296231" version="1" comment="libisccfg1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611603" version="1" comment="libns1604 is &lt;9.16.6-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296232" version="1" comment="libns1604 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611604" version="1" comment="libns1604-32bit is &lt;9.16.6-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296233" version="1" comment="libns1604-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611605" version="1" comment="libuv-devel is &lt;1.18.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296235" version="1" comment="libuv-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611606" version="1" comment="libuv1 is &lt;1.18.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296236" version="1" comment="libuv1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611607" version="1" comment="libuv1-32bit is &lt;1.18.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296237" version="1" comment="libuv1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611608" version="1" comment="python3-bind is &lt;9.16.6-lp152.14.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177148" version="1" comment="python3-bind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611609" version="1" comment="sysuser-shadow is &lt;2.0-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296238" version="1" comment="sysuser-shadow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611610" version="1" comment="sysuser-tools is &lt;2.0-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296239" version="1" comment="sysuser-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632139" version="1" comment="spectre-meltdown-checker is &lt;0.44-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275301" version="1" comment="spectre-meltdown-checker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614218" version="1" comment="libzypp is &lt;17.25.5-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161722" version="1" comment="libzypp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614219" version="1" comment="libzypp-devel is &lt;17.25.5-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161723" version="1" comment="libzypp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614220" version="1" comment="libzypp-devel-doc is &lt;17.25.5-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161724" version="1" comment="libzypp-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614221" version="1" comment="yast2-installation is &lt;4.2.48-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341737" version="1" comment="yast2-installation is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614222" version="1" comment="zypper is &lt;1.14.41-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251910" version="1" comment="zypper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614223" version="1" comment="zypper-aptitude is &lt;1.14.41-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251911" version="1" comment="zypper-aptitude is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614224" version="1" comment="zypper-log is &lt;1.14.41-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251912" version="1" comment="zypper-log is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614225" version="1" comment="zypper-needs-restarting is &lt;1.14.41-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262480" version="1" comment="zypper-needs-restarting is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612775" version="1" comment="nasm is &lt;2.14.02-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161694" version="1" comment="nasm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610752" version="1" comment="graphviz is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167847" version="1" comment="graphviz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610753" version="1" comment="graphviz-devel is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167849" version="1" comment="graphviz-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610754" version="1" comment="graphviz-doc is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167851" version="1" comment="graphviz-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610755" version="1" comment="graphviz-gd is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167853" version="1" comment="graphviz-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610756" version="1" comment="graphviz-gnome is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167855" version="1" comment="graphviz-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610757" version="1" comment="graphviz-guile is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167857" version="1" comment="graphviz-guile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610758" version="1" comment="graphviz-gvedit is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167859" version="1" comment="graphviz-gvedit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610759" version="1" comment="graphviz-java is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167861" version="1" comment="graphviz-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610760" version="1" comment="graphviz-lua is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167863" version="1" comment="graphviz-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610761" version="1" comment="graphviz-perl is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167865" version="1" comment="graphviz-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610762" version="1" comment="graphviz-php is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167867" version="1" comment="graphviz-php is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610763" version="1" comment="graphviz-plugins-core is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254560" version="1" comment="graphviz-plugins-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610764" version="1" comment="graphviz-python is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167871" version="1" comment="graphviz-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610765" version="1" comment="graphviz-ruby is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167873" version="1" comment="graphviz-ruby is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610766" version="1" comment="graphviz-smyrna is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167875" version="1" comment="graphviz-smyrna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610767" version="1" comment="graphviz-tcl is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167877" version="1" comment="graphviz-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610768" version="1" comment="libgraphviz6 is &lt;2.40.1-lp152.7.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254561" version="1" comment="libgraphviz6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612962" version="1" comment="libwavpack1 is &lt;5.4.0-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172747" version="1" comment="libwavpack1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612963" version="1" comment="libwavpack1-32bit is &lt;5.4.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172748" version="1" comment="libwavpack1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612964" version="1" comment="wavpack is &lt;5.4.0-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172749" version="1" comment="wavpack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612965" version="1" comment="wavpack-devel is &lt;5.4.0-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172750" version="1" comment="wavpack-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632549" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151260" version="1" comment="libxerces-c-3_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632550" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.4-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153271" version="1" comment="libxerces-c-3_1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632551" version="1" comment="libxerces-c-devel is &lt;3.1.4-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153272" version="1" comment="libxerces-c-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632552" version="1" comment="xerces-c is &lt;3.1.4-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153273" version="1" comment="xerces-c is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632553" version="1" comment="xerces-c-doc is &lt;3.1.4-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252435" version="1" comment="xerces-c-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631327" version="1" comment="libsndfile-devel is &lt;1.0.28-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151189" version="1" comment="libsndfile-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631328" version="1" comment="libsndfile-progs is &lt;1.0.28-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152565" version="1" comment="libsndfile-progs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631329" version="1" comment="libsndfile1 is &lt;1.0.28-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151190" version="1" comment="libsndfile1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631330" version="1" comment="libsndfile1-32bit is &lt;1.0.28-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151191" version="1" comment="libsndfile1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656708" version="1" comment="kernel-debug is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151957" version="1" comment="kernel-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656709" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151959" version="1" comment="kernel-debug-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656710" version="1" comment="kernel-default is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656711" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.102.1.lp152.8.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656712" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.102.1.lp152.8.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291400" version="1" comment="kernel-default-base-rebuild is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656713" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151355" version="1" comment="kernel-default-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656714" version="1" comment="kernel-devel is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151356" version="1" comment="kernel-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656715" version="1" comment="kernel-docs is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151357" version="1" comment="kernel-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656716" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151961" version="1" comment="kernel-docs-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656717" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177719" version="1" comment="kernel-kvmsmall is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656718" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177721" version="1" comment="kernel-kvmsmall-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656719" version="1" comment="kernel-macros is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151358" version="1" comment="kernel-macros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656720" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151966" version="1" comment="kernel-obs-build is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656721" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151967" version="1" comment="kernel-obs-qa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656722" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291401" version="1" comment="kernel-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656723" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291402" version="1" comment="kernel-preempt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656724" version="1" comment="kernel-source is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151360" version="1" comment="kernel-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656725" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151974" version="1" comment="kernel-source-vanilla is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656726" version="1" comment="kernel-syms is &lt;5.3.18-lp152.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151361" version="1" comment="kernel-syms is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631858" version="1" comment="libmspack-devel is &lt;0.6-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238457" version="1" comment="libmspack-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631859" version="1" comment="libmspack0 is &lt;0.6-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151459" version="1" comment="libmspack0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631860" version="1" comment="libmspack0-32bit is &lt;0.6-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238458" version="1" comment="libmspack0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631861" version="1" comment="mspack-tools is &lt;0.6-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247101" version="1" comment="mspack-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652716" version="1" comment="ssh-audit is &lt;2.5.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652725" version="1" comment="ssh-audit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611174" version="1" comment="libqt4 is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151228" version="1" comment="libqt4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611175" version="1" comment="libqt4-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151229" version="1" comment="libqt4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611176" version="1" comment="libqt4-devel is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151230" version="1" comment="libqt4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611177" version="1" comment="libqt4-devel-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230219" version="1" comment="libqt4-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611178" version="1" comment="libqt4-devel-doc is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230220" version="1" comment="libqt4-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611179" version="1" comment="libqt4-devel-doc-data is &lt;4.8.7-lp152.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230221" version="1" comment="libqt4-devel-doc-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611180" version="1" comment="libqt4-linguist is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151231" version="1" comment="libqt4-linguist is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611181" version="1" comment="libqt4-private-headers-devel is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230222" version="1" comment="libqt4-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611182" version="1" comment="libqt4-qt3support is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151232" version="1" comment="libqt4-qt3support is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611183" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151233" version="1" comment="libqt4-qt3support-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611184" version="1" comment="libqt4-sql is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151234" version="1" comment="libqt4-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611185" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151235" version="1" comment="libqt4-sql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611186" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151238" version="1" comment="libqt4-sql-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611187" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151240" version="1" comment="libqt4-sql-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611188" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151241" version="1" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611189" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151242" version="1" comment="libqt4-sql-unixODBC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611190" version="1" comment="libqt4-x11 is &lt;4.8.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151244" version="1" comment="libqt4-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611191" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151245" version="1" comment="libqt4-x11-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611192" version="1" comment="qt4-x11-tools is &lt;4.8.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230226" version="1" comment="qt4-x11-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615128" version="1" comment="python3-salt is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174860" version="1" comment="python3-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615129" version="1" comment="salt is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615130" version="1" comment="salt-api is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153593" version="1" comment="salt-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615131" version="1" comment="salt-bash-completion is &lt;3002.2-lp152.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153594" version="1" comment="salt-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615132" version="1" comment="salt-cloud is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153595" version="1" comment="salt-cloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615133" version="1" comment="salt-doc is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153596" version="1" comment="salt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615134" version="1" comment="salt-fish-completion is &lt;3002.2-lp152.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153597" version="1" comment="salt-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615135" version="1" comment="salt-master is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153598" version="1" comment="salt-master is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615136" version="1" comment="salt-minion is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615137" version="1" comment="salt-proxy is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153600" version="1" comment="salt-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615138" version="1" comment="salt-ssh is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153602" version="1" comment="salt-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615139" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280429" version="1" comment="salt-standalone-formulas-configuration is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615140" version="1" comment="salt-syndic is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153603" version="1" comment="salt-syndic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615141" version="1" comment="salt-transactional-update is &lt;3002.2-lp152.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479908" version="1" comment="salt-transactional-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615142" version="1" comment="salt-zsh-completion is &lt;3002.2-lp152.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153604" version="1" comment="salt-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610715" version="1" comment="gettext-csharp is &lt;0.19.8.1-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290347" version="1" comment="gettext-csharp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610716" version="1" comment="gettext-java is &lt;0.19.8.1-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290348" version="1" comment="gettext-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610717" version="1" comment="gettext-runtime is &lt;0.19.8.1-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290349" version="1" comment="gettext-runtime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610718" version="1" comment="gettext-runtime-32bit is &lt;0.19.8.1-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290350" version="1" comment="gettext-runtime-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610719" version="1" comment="gettext-runtime-mini is &lt;0.19.8.1-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290351" version="1" comment="gettext-runtime-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610720" version="1" comment="gettext-runtime-mini-tools-doc is &lt;0.19.8.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290352" version="1" comment="gettext-runtime-mini-tools-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610721" version="1" comment="gettext-runtime-tools-doc is &lt;0.19.8.1-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290353" version="1" comment="gettext-runtime-tools-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610722" version="1" comment="gettext-tools is &lt;0.19.8.1-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290354" version="1" comment="gettext-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610723" version="1" comment="gettext-tools-mini is &lt;0.19.8.1-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290355" version="1" comment="gettext-tools-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614474" version="1" comment="netdata is &lt;1.29.3-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353393" version="1" comment="netdata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615251" version="1" comment="tmux is &lt;3.1c-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298611" version="1" comment="tmux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614774" version="1" comment="libu2f-host-devel is &lt;1.1.10-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244552" version="1" comment="libu2f-host-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614775" version="1" comment="libu2f-host-doc is &lt;1.1.10-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244553" version="1" comment="libu2f-host-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614776" version="1" comment="libu2f-host0 is &lt;1.1.10-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244554" version="1" comment="libu2f-host0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614777" version="1" comment="u2f-host is &lt;1.1.10-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244555" version="1" comment="u2f-host is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614668" version="1" comment="openvpn is &lt;2.4.3-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152221" version="1" comment="openvpn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614669" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157252" version="1" comment="openvpn-auth-pam-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614670" version="1" comment="openvpn-devel is &lt;2.4.3-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157253" version="1" comment="openvpn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614671" version="1" comment="openvpn-down-root-plugin is &lt;2.4.3-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157254" version="1" comment="openvpn-down-root-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609986" version="1" comment="ntp is &lt;4.2.8p15-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151182" version="1" comment="ntp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609987" version="1" comment="ntp-doc is &lt;4.2.8p15-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151183" version="1" comment="ntp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615252" version="1" comment="otrs is &lt;6.0.29-lp152.2.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154272" version="1" comment="otrs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615253" version="1" comment="otrs-doc is &lt;6.0.29-lp152.2.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154273" version="1" comment="otrs-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615254" version="1" comment="otrs-itsm is &lt;6.0.29-lp152.2.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154274" version="1" comment="otrs-itsm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613247" version="1" comment="buildah is &lt;1.19.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266828" version="1" comment="buildah is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613248" version="1" comment="libcontainers-common is &lt;20210112-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266789" version="1" comment="libcontainers-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613249" version="1" comment="podman is &lt;2.2.1-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613250" version="1" comment="podman-cni-config is &lt;2.2.1-lp152.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266792" version="1" comment="podman-cni-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610164" version="1" comment="dracut-saltboot is &lt;0.1.1590413773.a959db7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291396" version="1" comment="dracut-saltboot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615255" version="1" comment="roundcubemail is &lt;1.3.15-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152670" version="1" comment="roundcubemail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612689" version="1" comment="graphviz is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612690" version="1" comment="graphviz-devel is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612691" version="1" comment="graphviz-doc is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612692" version="1" comment="graphviz-gd is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612693" version="1" comment="graphviz-gnome is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612694" version="1" comment="graphviz-guile is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612695" version="1" comment="graphviz-gvedit is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612696" version="1" comment="graphviz-java is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612697" version="1" comment="graphviz-lua is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612698" version="1" comment="graphviz-perl is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612699" version="1" comment="graphviz-php is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612700" version="1" comment="graphviz-plugins-core is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612701" version="1" comment="graphviz-python is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612702" version="1" comment="graphviz-ruby is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612703" version="1" comment="graphviz-smyrna is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612704" version="1" comment="graphviz-tcl is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612705" version="1" comment="libgraphviz6 is &lt;2.40.1-lp152.7.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614154" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261407" version="1" comment="perl-Mail-SpamAssassin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614155" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261408" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614156" version="1" comment="spamassassin is &lt;3.4.5-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261409" version="1" comment="spamassassin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612465" version="1" comment="clamav is &lt;0.103.0-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151381" version="1" comment="clamav is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612466" version="1" comment="clamav-devel is &lt;0.103.0-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231589" version="1" comment="clamav-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612467" version="1" comment="libclamav9 is &lt;0.103.0-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339621" version="1" comment="libclamav9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612468" version="1" comment="libfreshclam2 is &lt;0.103.0-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339622" version="1" comment="libfreshclam2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611818" version="1" comment="binutils is &lt;2.35-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152512" version="1" comment="binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611819" version="1" comment="binutils-devel is &lt;2.35-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152513" version="1" comment="binutils-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611820" version="1" comment="binutils-devel-32bit is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167590" version="1" comment="binutils-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611821" version="1" comment="binutils-gold is &lt;2.35-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167592" version="1" comment="binutils-gold is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611822" version="1" comment="cross-aarch64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167594" version="1" comment="cross-aarch64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611823" version="1" comment="cross-arm-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167596" version="1" comment="cross-arm-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611824" version="1" comment="cross-avr-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167598" version="1" comment="cross-avr-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611825" version="1" comment="cross-epiphany-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238034" version="1" comment="cross-epiphany-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611826" version="1" comment="cross-hppa-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167600" version="1" comment="cross-hppa-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611827" version="1" comment="cross-hppa64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167602" version="1" comment="cross-hppa64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611828" version="1" comment="cross-i386-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167604" version="1" comment="cross-i386-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611829" version="1" comment="cross-ia64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167606" version="1" comment="cross-ia64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611830" version="1" comment="cross-m68k-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167608" version="1" comment="cross-m68k-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611831" version="1" comment="cross-mips-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167610" version="1" comment="cross-mips-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611832" version="1" comment="cross-ppc-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167612" version="1" comment="cross-ppc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611833" version="1" comment="cross-ppc64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167614" version="1" comment="cross-ppc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611834" version="1" comment="cross-ppc64le-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167616" version="1" comment="cross-ppc64le-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611835" version="1" comment="cross-riscv64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238035" version="1" comment="cross-riscv64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611836" version="1" comment="cross-rx-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238036" version="1" comment="cross-rx-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611837" version="1" comment="cross-s390-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167618" version="1" comment="cross-s390-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611838" version="1" comment="cross-s390x-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167620" version="1" comment="cross-s390x-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611839" version="1" comment="cross-sparc-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167622" version="1" comment="cross-sparc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611840" version="1" comment="cross-sparc64-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167624" version="1" comment="cross-sparc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611841" version="1" comment="cross-spu-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167626" version="1" comment="cross-spu-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611842" version="1" comment="cross-xtensa-binutils is &lt;2.35-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297932" version="1" comment="cross-xtensa-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611843" version="1" comment="libctf-nobfd0 is &lt;2.35-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297779" version="1" comment="libctf-nobfd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611844" version="1" comment="libctf0 is &lt;2.35-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297780" version="1" comment="libctf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615256" version="1" comment="nsd is &lt;4.3.4-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338518" version="1" comment="nsd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611790" version="1" comment="python2-virt-bootstrap is &lt;1.0.0-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297785" version="1" comment="python2-virt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611791" version="1" comment="python3-virt-bootstrap is &lt;1.0.0-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297786" version="1" comment="python3-virt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612016" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251318" version="1" comment="libSDL-1_2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612017" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251319" version="1" comment="libSDL-1_2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612018" version="1" comment="libSDL-devel is &lt;1.2.15-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251320" version="1" comment="libSDL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612019" version="1" comment="libSDL-devel-32bit is &lt;1.2.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251321" version="1" comment="libSDL-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630546" version="1" comment="transfig is &lt;3.2.8a-lp152.6.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172240" version="1" comment="transfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611197" version="1" comment="ovmf is &lt;201911-lp152.6.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231457" version="1" comment="ovmf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611198" version="1" comment="ovmf-tools is &lt;201911-lp152.6.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231458" version="1" comment="ovmf-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611199" version="1" comment="qemu-ovmf-ia32 is &lt;201911-lp152.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231459" version="1" comment="qemu-ovmf-ia32 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611200" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-lp152.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231460" version="1" comment="qemu-ovmf-x86_64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611201" version="1" comment="qemu-ovmf-x86_64-debug is &lt;201911-lp152.6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231461" version="1" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612512" version="1" comment="ovmf is &lt;201911-lp152.6.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612513" version="1" comment="ovmf-tools is &lt;201911-lp152.6.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612514" version="1" comment="qemu-ovmf-ia32 is &lt;201911-lp152.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612515" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-lp152.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612516" version="1" comment="qemu-ovmf-x86_64-debug is &lt;201911-lp152.6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614228" version="1" comment="shim is &lt;15.4-lp152.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611306" version="1" comment="libtiff-devel is &lt;4.0.9-lp152.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151316" version="1" comment="libtiff-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611307" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-lp152.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152222" version="1" comment="libtiff-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611308" version="1" comment="libtiff5 is &lt;4.0.9-lp152.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611309" version="1" comment="libtiff5-32bit is &lt;4.0.9-lp152.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151318" version="1" comment="libtiff5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611310" version="1" comment="tiff is &lt;4.0.9-lp152.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151319" version="1" comment="tiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612684" version="1" comment="grafana is &lt;7.0.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291397" version="1" comment="grafana is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612685" version="1" comment="grafana-piechart-panel is &lt;1.4.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291398" version="1" comment="grafana-piechart-panel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612686" version="1" comment="grafana-status-panel is &lt;1.0.9-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291399" version="1" comment="grafana-status-panel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662403" version="1" comment="kernel-firmware is &lt;20200107-lp152.2.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167632" version="1" comment="kernel-firmware is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662404" version="1" comment="ucode-amd is &lt;20200107-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167634" version="1" comment="ucode-amd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615190" version="1" comment="libBasicUsageEnvironment1 is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260574" version="1" comment="libBasicUsageEnvironment1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615191" version="1" comment="libUsageEnvironment3 is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260576" version="1" comment="libUsageEnvironment3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615192" version="1" comment="libgroupsock30 is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479974" version="1" comment="libgroupsock30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615193" version="1" comment="libliveMedia94 is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479975" version="1" comment="libliveMedia94 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615194" version="1" comment="live555 is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243095" version="1" comment="live555 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615195" version="1" comment="live555-devel is &lt;2021.05.22-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243097" version="1" comment="live555-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615021" version="1" comment="csync2 is &lt;2.0+git.1461714863.10636a4-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477847" version="1" comment="csync2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624837" version="1" comment="qemu is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624838" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624839" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266837" version="1" comment="qemu-audio-alsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624840" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266839" version="1" comment="qemu-audio-pa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624841" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266840" version="1" comment="qemu-audio-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624842" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151106" version="1" comment="qemu-block-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624843" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154081" version="1" comment="qemu-block-dmg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624844" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223339" version="1" comment="qemu-block-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624845" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154082" version="1" comment="qemu-block-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624846" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266841" version="1" comment="qemu-block-nfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624847" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151107" version="1" comment="qemu-block-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624848" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154083" version="1" comment="qemu-block-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624849" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151108" version="1" comment="qemu-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624850" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624851" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624852" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161270" version="1" comment="qemu-ksm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624853" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151110" version="1" comment="qemu-kvm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624854" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151111" version="1" comment="qemu-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624855" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151112" version="1" comment="qemu-linux-user is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624856" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291440" version="1" comment="qemu-microvm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624857" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151113" version="1" comment="qemu-ppc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624858" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151114" version="1" comment="qemu-s390 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624859" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624860" version="1" comment="qemu-sgabios is &lt;8-lp152.9.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624861" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.16.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153020" version="1" comment="qemu-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624862" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624863" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266842" version="1" comment="qemu-ui-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624864" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266843" version="1" comment="qemu-ui-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624865" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266844" version="1" comment="qemu-ui-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624866" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291441" version="1" comment="qemu-ui-spice-app is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624867" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624868" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291442" version="1" comment="qemu-vhost-user-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624869" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614180" version="1" comment="opensc is &lt;0.19.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239073" version="1" comment="opensc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614181" version="1" comment="opensc-32bit is &lt;0.19.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239136" version="1" comment="opensc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613797" version="1" comment="libmysofa-devel is &lt;0.9.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347885" version="1" comment="libmysofa-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613798" version="1" comment="libmysofa0 is &lt;0.9.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347886" version="1" comment="libmysofa0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613975" version="1" comment="hostapd is &lt;2.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166193" version="1" comment="hostapd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611667" version="1" comment="hunspell is &lt;1.6.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153301" version="1" comment="hunspell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611668" version="1" comment="hunspell-devel is &lt;1.6.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153303" version="1" comment="hunspell-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611669" version="1" comment="hunspell-devel-32bit is &lt;1.6.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153304" version="1" comment="hunspell-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611670" version="1" comment="hunspell-tools is &lt;1.6.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153306" version="1" comment="hunspell-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611671" version="1" comment="libhunspell-1_6-0 is &lt;1.6.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296727" version="1" comment="libhunspell-1_6-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611672" version="1" comment="libhunspell-1_6-0-32bit is &lt;1.6.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296728" version="1" comment="libhunspell-1_6-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612072" version="1" comment="rmt-server is &lt;2.6.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244412" version="1" comment="rmt-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612073" version="1" comment="rmt-server-config is &lt;2.6.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266831" version="1" comment="rmt-server-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612074" version="1" comment="rmt-server-pubcloud is &lt;2.6.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244413" version="1" comment="rmt-server-pubcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612014" version="1" comment="python2-waitress is &lt;1.4.3-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299158" version="1" comment="python2-waitress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612015" version="1" comment="python3-waitress is &lt;1.4.3-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299159" version="1" comment="python3-waitress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612581" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177173" version="1" comment="libpython3_6m1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612582" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.12-lp152.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244052" version="1" comment="libpython3_6m1_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612583" version="1" comment="python3 is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612584" version="1" comment="python3-32bit is &lt;3.6.12-lp152.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152171" version="1" comment="python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612585" version="1" comment="python3-base is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612586" version="1" comment="python3-base-32bit is &lt;3.6.12-lp152.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152172" version="1" comment="python3-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612587" version="1" comment="python3-curses is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151917" version="1" comment="python3-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612588" version="1" comment="python3-dbm is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151918" version="1" comment="python3-dbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612589" version="1" comment="python3-devel is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152173" version="1" comment="python3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612590" version="1" comment="python3-doc is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152174" version="1" comment="python3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612591" version="1" comment="python3-doc-devhelp is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340456" version="1" comment="python3-doc-devhelp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612592" version="1" comment="python3-idle is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152176" version="1" comment="python3-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612593" version="1" comment="python3-testsuite is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152177" version="1" comment="python3-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612594" version="1" comment="python3-tk is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151919" version="1" comment="python3-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612595" version="1" comment="python3-tools is &lt;3.6.12-lp152.4.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152178" version="1" comment="python3-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612244" version="1" comment="libssh2-1 is &lt;1.9.0-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152658" version="1" comment="libssh2-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612245" version="1" comment="libssh2-1-32bit is &lt;1.9.0-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153297" version="1" comment="libssh2-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612246" version="1" comment="libssh2-devel is &lt;1.9.0-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153298" version="1" comment="libssh2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614731" version="1" comment="fribidi is &lt;1.0.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475532" version="1" comment="fribidi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614732" version="1" comment="fribidi-devel is &lt;1.0.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475533" version="1" comment="fribidi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614733" version="1" comment="libfribidi0 is &lt;1.0.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475534" version="1" comment="libfribidi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614734" version="1" comment="libfribidi0-32bit is &lt;1.0.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475535" version="1" comment="libfribidi0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613296" version="1" comment="libnghttp2-14 is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613297" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177223" version="1" comment="libnghttp2-14-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613298" version="1" comment="libnghttp2-devel is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153584" version="1" comment="libnghttp2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613299" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153585" version="1" comment="libnghttp2_asio-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613300" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153586" version="1" comment="libnghttp2_asio1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613301" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267106" version="1" comment="libnghttp2_asio1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613302" version="1" comment="nghttp2 is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153587" version="1" comment="nghttp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613303" version="1" comment="python3-nghttp2 is &lt;1.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267108" version="1" comment="python3-nghttp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614700" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342853" version="1" comment="cluster-md-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614701" version="1" comment="cluster-md-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342854" version="1" comment="cluster-md-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614702" version="1" comment="dlm-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342855" version="1" comment="dlm-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614703" version="1" comment="dlm-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342856" version="1" comment="dlm-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614704" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342857" version="1" comment="gfs2-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614705" version="1" comment="gfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342858" version="1" comment="gfs2-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614003" version="1" comment="kernel-debug is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614004" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614005" version="1" comment="kernel-default is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614006" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.69.1.lp152.8.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614007" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.69.1.lp152.8.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614008" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614009" version="1" comment="kernel-devel is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614706" version="1" comment="kernel-devel-rt is &lt;5.3.18-lp152.3.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342859" version="1" comment="kernel-devel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614010" version="1" comment="kernel-docs is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614011" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614012" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614013" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614014" version="1" comment="kernel-macros is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614015" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614016" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614017" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614018" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614707" version="1" comment="kernel-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342860" version="1" comment="kernel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614708" version="1" comment="kernel-rt-devel is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342861" version="1" comment="kernel-rt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614709" version="1" comment="kernel-rt-extra is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342862" version="1" comment="kernel-rt-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614710" version="1" comment="kernel-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342863" version="1" comment="kernel-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614711" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342864" version="1" comment="kernel-rt_debug-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614712" version="1" comment="kernel-rt_debug-extra is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342865" version="1" comment="kernel-rt_debug-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614019" version="1" comment="kernel-source is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614713" version="1" comment="kernel-source-rt is &lt;5.3.18-lp152.3.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342866" version="1" comment="kernel-source-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614020" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614021" version="1" comment="kernel-syms is &lt;5.3.18-lp152.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614714" version="1" comment="kernel-syms-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342867" version="1" comment="kernel-syms-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614715" version="1" comment="kselftests-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342868" version="1" comment="kselftests-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614716" version="1" comment="kselftests-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342869" version="1" comment="kselftests-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614717" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342870" version="1" comment="ocfs2-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614718" version="1" comment="ocfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342871" version="1" comment="ocfs2-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614719" version="1" comment="reiserfs-kmp-rt is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342872" version="1" comment="reiserfs-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614720" version="1" comment="reiserfs-kmp-rt_debug is &lt;5.3.18-lp152.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342873" version="1" comment="reiserfs-kmp-rt_debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615157" version="1" comment="cryptctl is &lt;2.4-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479976" version="1" comment="cryptctl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612706" version="1" comment="libunbound-devel-mini is &lt;1.6.8-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286672" version="1" comment="libunbound-devel-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612707" version="1" comment="libunbound2 is &lt;1.6.8-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177204" version="1" comment="libunbound2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612708" version="1" comment="unbound is &lt;1.6.8-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286673" version="1" comment="unbound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612709" version="1" comment="unbound-anchor is &lt;1.6.8-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177205" version="1" comment="unbound-anchor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612710" version="1" comment="unbound-devel is &lt;1.6.8-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286674" version="1" comment="unbound-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612711" version="1" comment="unbound-munin is &lt;1.6.8-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286675" version="1" comment="unbound-munin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612712" version="1" comment="unbound-python is &lt;1.6.8-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286676" version="1" comment="unbound-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613057" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613058" version="1" comment="cluster-md-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613059" version="1" comment="dlm-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613060" version="1" comment="dlm-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613061" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613062" version="1" comment="gfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612718" version="1" comment="kernel-debug is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612719" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612720" version="1" comment="kernel-default is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612721" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.26.2.lp152.8.2.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612722" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.26.2.lp152.8.2.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612723" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612724" version="1" comment="kernel-devel is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613063" version="1" comment="kernel-devel-rt is &lt;5.3.18-lp152.3.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612725" version="1" comment="kernel-docs is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612726" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612727" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612728" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612729" version="1" comment="kernel-macros is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612730" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612731" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612732" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612733" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613064" version="1" comment="kernel-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613065" version="1" comment="kernel-rt-devel is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613066" version="1" comment="kernel-rt-extra is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613067" version="1" comment="kernel-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613068" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613069" version="1" comment="kernel-rt_debug-extra is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612734" version="1" comment="kernel-source is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613070" version="1" comment="kernel-source-rt is &lt;5.3.18-lp152.3.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612735" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.26.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612736" version="1" comment="kernel-syms is &lt;5.3.18-lp152.26.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613071" version="1" comment="kernel-syms-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613072" version="1" comment="kselftests-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613073" version="1" comment="kselftests-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613074" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613075" version="1" comment="ocfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613076" version="1" comment="reiserfs-kmp-rt is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613077" version="1" comment="reiserfs-kmp-rt_debug is &lt;5.3.18-lp152.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611734" version="1" comment="lout is &lt;3.40-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297567" version="1" comment="lout is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632607" version="1" comment="libesmtp is &lt;1.0.6-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632497" version="1" comment="libesmtp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632608" version="1" comment="libesmtp-devel is &lt;1.0.6-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632498" version="1" comment="libesmtp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658408" version="1" comment="libnetcdf-gnu-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658443" version="1" comment="libnetcdf-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658409" version="1" comment="libnetcdf-gnu-mpich-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658444" version="1" comment="libnetcdf-gnu-mpich-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658410" version="1" comment="libnetcdf-gnu-mvapich2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658445" version="1" comment="libnetcdf-gnu-mvapich2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658411" version="1" comment="libnetcdf-gnu-openmpi2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658446" version="1" comment="libnetcdf-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658412" version="1" comment="libnetcdf-gnu-openmpi3-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658447" version="1" comment="libnetcdf-gnu-openmpi3-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658413" version="1" comment="libnetcdf_4_7_3-gnu-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658256" version="1" comment="libnetcdf_4_7_3-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658414" version="1" comment="libnetcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658257" version="1" comment="libnetcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658415" version="1" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658258" version="1" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658416" version="1" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658259" version="1" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658417" version="1" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658260" version="1" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658418" version="1" comment="netcdf-gnu-hpc is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658448" version="1" comment="netcdf-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658419" version="1" comment="netcdf-gnu-hpc-devel is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658449" version="1" comment="netcdf-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658420" version="1" comment="netcdf-gnu-mpich-hpc is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658450" version="1" comment="netcdf-gnu-mpich-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658421" version="1" comment="netcdf-gnu-mpich-hpc-devel is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658451" version="1" comment="netcdf-gnu-mpich-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658422" version="1" comment="netcdf-gnu-mvapich2-hpc is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658452" version="1" comment="netcdf-gnu-mvapich2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658423" version="1" comment="netcdf-gnu-mvapich2-hpc-devel is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658453" version="1" comment="netcdf-gnu-mvapich2-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658424" version="1" comment="netcdf-gnu-openmpi2-hpc is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658454" version="1" comment="netcdf-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658425" version="1" comment="netcdf-gnu-openmpi2-hpc-devel is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658455" version="1" comment="netcdf-gnu-openmpi2-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658426" version="1" comment="netcdf-gnu-openmpi3-hpc is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658456" version="1" comment="netcdf-gnu-openmpi3-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658427" version="1" comment="netcdf-gnu-openmpi3-hpc-devel is &lt;4.7.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658457" version="1" comment="netcdf-gnu-openmpi3-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658428" version="1" comment="netcdf_4_7_3-gnu-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658265" version="1" comment="netcdf_4_7_3-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658429" version="1" comment="netcdf_4_7_3-gnu-hpc-devel is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658266" version="1" comment="netcdf_4_7_3-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658430" version="1" comment="netcdf_4_7_3-gnu-hpc-devel-static is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658267" version="1" comment="netcdf_4_7_3-gnu-hpc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658431" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658268" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658432" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658269" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658433" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658270" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658434" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658271" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658435" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658272" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658436" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658273" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658437" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658274" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658438" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658275" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658439" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658276" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658440" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658277" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658441" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658278" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658442" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is &lt;4.7.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658279" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653930" version="1" comment="libpcre1 is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152526" version="1" comment="libpcre1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653931" version="1" comment="libpcre1-32bit is &lt;8.45-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152527" version="1" comment="libpcre1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653932" version="1" comment="libpcre16-0 is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152528" version="1" comment="libpcre16-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653933" version="1" comment="libpcre16-0-32bit is &lt;8.45-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152529" version="1" comment="libpcre16-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653934" version="1" comment="libpcrecpp0 is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152530" version="1" comment="libpcrecpp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653935" version="1" comment="libpcrecpp0-32bit is &lt;8.45-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152531" version="1" comment="libpcrecpp0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653936" version="1" comment="libpcreposix0 is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152532" version="1" comment="libpcreposix0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653937" version="1" comment="libpcreposix0-32bit is &lt;8.45-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152533" version="1" comment="libpcreposix0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653938" version="1" comment="pcre-devel is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152535" version="1" comment="pcre-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653939" version="1" comment="pcre-devel-static is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152536" version="1" comment="pcre-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653940" version="1" comment="pcre-doc is &lt;8.45-lp152.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152537" version="1" comment="pcre-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653941" version="1" comment="pcre-tools is &lt;8.45-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152538" version="1" comment="pcre-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610517" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151571" version="1" comment="libpython2_7-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610518" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151572" version="1" comment="libpython2_7-1_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610519" version="1" comment="python is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151913" version="1" comment="python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610520" version="1" comment="python-32bit is &lt;2.7.17-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153290" version="1" comment="python-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610521" version="1" comment="python-base is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151573" version="1" comment="python-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610522" version="1" comment="python-base-32bit is &lt;2.7.17-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153291" version="1" comment="python-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610523" version="1" comment="python-curses is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151914" version="1" comment="python-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610524" version="1" comment="python-demo is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153292" version="1" comment="python-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610525" version="1" comment="python-devel is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151574" version="1" comment="python-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610526" version="1" comment="python-doc is &lt;2.7.17-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153293" version="1" comment="python-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610527" version="1" comment="python-doc-pdf is &lt;2.7.17-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153294" version="1" comment="python-doc-pdf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610528" version="1" comment="python-gdbm is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151915" version="1" comment="python-gdbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610529" version="1" comment="python-idle is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153295" version="1" comment="python-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610530" version="1" comment="python-tk is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153296" version="1" comment="python-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610531" version="1" comment="python-xml is &lt;2.7.17-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151575" version="1" comment="python-xml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613120" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613121" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613264" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613265" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.12-lp152.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613122" version="1" comment="python is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613123" version="1" comment="python-32bit is &lt;2.7.17-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613124" version="1" comment="python-base is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613125" version="1" comment="python-base-32bit is &lt;2.7.17-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613126" version="1" comment="python-curses is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613127" version="1" comment="python-demo is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613128" version="1" comment="python-devel is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613129" version="1" comment="python-doc is &lt;2.7.17-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613130" version="1" comment="python-doc-pdf is &lt;2.7.17-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613131" version="1" comment="python-gdbm is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613132" version="1" comment="python-idle is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613133" version="1" comment="python-tk is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613134" version="1" comment="python-xml is &lt;2.7.17-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612384" version="1" comment="python2-pip is &lt;10.0.1-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294865" version="1" comment="python2-pip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612385" version="1" comment="python2-pip-wheel is &lt;10.0.1-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337921" version="1" comment="python2-pip-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612331" version="1" comment="python2-setuptools is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303045" version="1" comment="python2-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612332" version="1" comment="python2-setuptools-test is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303046" version="1" comment="python2-setuptools-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612333" version="1" comment="python2-setuptools-wheel is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303047" version="1" comment="python2-setuptools-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613266" version="1" comment="python3 is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613267" version="1" comment="python3-32bit is &lt;3.6.12-lp152.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613268" version="1" comment="python3-base is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613269" version="1" comment="python3-base-32bit is &lt;3.6.12-lp152.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613270" version="1" comment="python3-curses is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613271" version="1" comment="python3-dbm is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613272" version="1" comment="python3-devel is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613273" version="1" comment="python3-doc is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613274" version="1" comment="python3-doc-devhelp is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613275" version="1" comment="python3-idle is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612386" version="1" comment="python3-pip is &lt;10.0.1-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151932" version="1" comment="python3-pip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612387" version="1" comment="python3-pip-wheel is &lt;10.0.1-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337922" version="1" comment="python3-pip-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612334" version="1" comment="python3-setuptools is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303048" version="1" comment="python3-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612335" version="1" comment="python3-setuptools-test is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303049" version="1" comment="python3-setuptools-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612336" version="1" comment="python3-setuptools-wheel is &lt;40.5.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303050" version="1" comment="python3-setuptools-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613276" version="1" comment="python3-testsuite is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613277" version="1" comment="python3-tk is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613278" version="1" comment="python3-tools is &lt;3.6.12-lp152.4.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611447" version="1" comment="perl-DBI is &lt;1.642-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613426" version="1" comment="glibc is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613427" version="1" comment="glibc-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613428" version="1" comment="glibc-devel is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613429" version="1" comment="glibc-devel-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613430" version="1" comment="glibc-devel-static is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613431" version="1" comment="glibc-devel-static-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613432" version="1" comment="glibc-extra is &lt;2.26-lp152.26.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613433" version="1" comment="glibc-html is &lt;2.26-lp152.26.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613434" version="1" comment="glibc-i18ndata is &lt;2.26-lp152.26.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613435" version="1" comment="glibc-info is &lt;2.26-lp152.26.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613436" version="1" comment="glibc-locale is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613437" version="1" comment="glibc-locale-base is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613438" version="1" comment="glibc-locale-base-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613439" version="1" comment="glibc-profile is &lt;2.26-lp152.26.6.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613440" version="1" comment="glibc-profile-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613441" version="1" comment="glibc-utils is &lt;2.26-lp152.26.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613442" version="1" comment="glibc-utils-32bit is &lt;2.26-lp152.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613443" version="1" comment="nscd is &lt;2.26-lp152.26.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631585" version="1" comment="aspell is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631516" version="1" comment="aspell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631586" version="1" comment="aspell-devel is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631517" version="1" comment="aspell-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631587" version="1" comment="aspell-ispell is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631518" version="1" comment="aspell-ispell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631588" version="1" comment="aspell-spell is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631519" version="1" comment="aspell-spell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631589" version="1" comment="libaspell15 is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631520" version="1" comment="libaspell15 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631590" version="1" comment="libaspell15-32bit is &lt;0.60.8-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631521" version="1" comment="libaspell15-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631591" version="1" comment="libpspell15 is &lt;0.60.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631522" version="1" comment="libpspell15 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631592" version="1" comment="libpspell15-32bit is &lt;0.60.8-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631523" version="1" comment="libpspell15-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630547" version="1" comment="aria2 is &lt;1.35.0-lp152.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151348" version="1" comment="aria2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630548" version="1" comment="aria2-devel is &lt;1.35.0-lp152.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243009" version="1" comment="aria2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630549" version="1" comment="aria2-lang is &lt;1.35.0-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151349" version="1" comment="aria2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630550" version="1" comment="libaria2-0 is &lt;1.35.0-lp152.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154087" version="1" comment="libaria2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612647" version="1" comment="ruby2.5-rubygem-bundler is &lt;1.16.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285430" version="1" comment="ruby2.5-rubygem-bundler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612648" version="1" comment="ruby2.5-rubygem-bundler-doc is &lt;1.16.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285431" version="1" comment="ruby2.5-rubygem-bundler-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612674" version="1" comment="mercurial is &lt;4.5.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153633" version="1" comment="mercurial is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612675" version="1" comment="mercurial-lang is &lt;4.5.2-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153634" version="1" comment="mercurial-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613010" version="1" comment="ruby2.5-rubygem-nokogiri is &lt;1.8.5-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342874" version="1" comment="ruby2.5-rubygem-nokogiri is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613011" version="1" comment="ruby2.5-rubygem-nokogiri-doc is &lt;1.8.5-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342875" version="1" comment="ruby2.5-rubygem-nokogiri-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613012" version="1" comment="ruby2.5-rubygem-nokogiri-testsuite is &lt;1.8.5-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342876" version="1" comment="ruby2.5-rubygem-nokogiri-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612756" version="1" comment="libBasicUsageEnvironment1 is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612757" version="1" comment="libUsageEnvironment3 is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612758" version="1" comment="libgroupsock8 is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260578" version="1" comment="libgroupsock8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612759" version="1" comment="libliveMedia66 is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260580" version="1" comment="libliveMedia66 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612760" version="1" comment="live555 is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612761" version="1" comment="live555-devel is &lt;2019.06.28-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612124" version="1" comment="chromedriver is &lt;87.0.4280.66-lp152.2.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152651" version="1" comment="chromedriver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612125" version="1" comment="chromium is &lt;87.0.4280.66-lp152.2.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152652" version="1" comment="chromium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613079" version="1" comment="cups is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151184" version="1" comment="cups is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613080" version="1" comment="cups-client is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151185" version="1" comment="cups-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613081" version="1" comment="cups-config is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177129" version="1" comment="cups-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613082" version="1" comment="cups-ddk is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172754" version="1" comment="cups-ddk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613083" version="1" comment="cups-devel is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151186" version="1" comment="cups-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613084" version="1" comment="cups-devel-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231804" version="1" comment="cups-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613085" version="1" comment="libcups2 is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177130" version="1" comment="libcups2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613086" version="1" comment="libcups2-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231805" version="1" comment="libcups2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613087" version="1" comment="libcupscgi1 is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177131" version="1" comment="libcupscgi1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613088" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231806" version="1" comment="libcupscgi1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613089" version="1" comment="libcupsimage2 is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177132" version="1" comment="libcupsimage2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613090" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231807" version="1" comment="libcupsimage2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613091" version="1" comment="libcupsmime1 is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177133" version="1" comment="libcupsmime1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613092" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231808" version="1" comment="libcupsmime1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613093" version="1" comment="libcupsppdc1 is &lt;2.2.7-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177134" version="1" comment="libcupsppdc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613094" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231809" version="1" comment="libcupsppdc1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632646" version="1" comment="libntfs-3g-devel is &lt;2021.8.22-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239068" version="1" comment="libntfs-3g-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632647" version="1" comment="libntfs-3g87 is &lt;2021.8.22-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252843" version="1" comment="libntfs-3g87 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632648" version="1" comment="ntfs-3g is &lt;2021.8.22-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239070" version="1" comment="ntfs-3g is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632649" version="1" comment="ntfsprogs is &lt;2021.8.22-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239072" version="1" comment="ntfsprogs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632650" version="1" comment="ntfsprogs-extra is &lt;2021.8.22-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252844" version="1" comment="ntfsprogs-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610419" version="1" comment="bbswitch is &lt;0.8-lp152.6.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173348" version="1" comment="bbswitch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610420" version="1" comment="bbswitch-kmp-default is &lt;0.8_k5.3.18_lp152.36-lp152.6.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173349" version="1" comment="bbswitch-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610421" version="1" comment="bbswitch-kmp-preempt is &lt;0.8_k5.3.18_lp152.36-lp152.6.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291403" version="1" comment="bbswitch-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610422" version="1" comment="crash is &lt;7.2.8-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173350" version="1" comment="crash is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610423" version="1" comment="crash-devel is &lt;7.2.8-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173351" version="1" comment="crash-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610424" version="1" comment="crash-doc is &lt;7.2.8-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173352" version="1" comment="crash-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610425" version="1" comment="crash-eppic is &lt;7.2.8-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173353" version="1" comment="crash-eppic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610426" version="1" comment="crash-gcore is &lt;7.2.8-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173354" version="1" comment="crash-gcore is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610427" version="1" comment="crash-kmp-default is &lt;7.2.8_k5.3.18_lp152.36-lp152.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152105" version="1" comment="crash-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610428" version="1" comment="crash-kmp-preempt is &lt;7.2.8_k5.3.18_lp152.36-lp152.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291404" version="1" comment="crash-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610429" version="1" comment="dpdk is &lt;19.11.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173355" version="1" comment="dpdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610430" version="1" comment="dpdk-devel is &lt;19.11.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173356" version="1" comment="dpdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610431" version="1" comment="dpdk-doc is &lt;19.11.1-lp152.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173357" version="1" comment="dpdk-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610432" version="1" comment="dpdk-examples is &lt;19.11.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173358" version="1" comment="dpdk-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610433" version="1" comment="dpdk-kmp-default is &lt;19.11.1_k5.3.18_lp152.36-lp152.2.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173359" version="1" comment="dpdk-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610434" version="1" comment="dpdk-kmp-preempt is &lt;19.11.1_k5.3.18_lp152.36-lp152.2.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291405" version="1" comment="dpdk-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610435" version="1" comment="dpdk-tools is &lt;19.11.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173360" version="1" comment="dpdk-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610436" version="1" comment="drbd is &lt;9.0.22~1+git.fe2b5983-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153194" version="1" comment="drbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610437" version="1" comment="drbd-kmp-default is &lt;9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153195" version="1" comment="drbd-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610438" version="1" comment="drbd-kmp-preempt is &lt;9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291406" version="1" comment="drbd-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610439" version="1" comment="hdjmod-kmp-default is &lt;1.28_k5.3.18_lp152.36-lp152.6.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153199" version="1" comment="hdjmod-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610440" version="1" comment="hdjmod-kmp-preempt is &lt;1.28_k5.3.18_lp152.36-lp152.6.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291407" version="1" comment="hdjmod-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610441" version="1" comment="kernel-debug is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610442" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610443" version="1" comment="kernel-default is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610444" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610445" version="1" comment="kernel-devel is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610446" version="1" comment="kernel-docs is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610447" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610448" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610449" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610450" version="1" comment="kernel-macros is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610451" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610452" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610453" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610454" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610455" version="1" comment="kernel-source is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610456" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610457" version="1" comment="kernel-syms is &lt;5.3.18-lp152.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610458" version="1" comment="libdpdk-20_0 is &lt;19.11.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291408" version="1" comment="libdpdk-20_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610459" version="1" comment="mhvtl is &lt;1.62-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291409" version="1" comment="mhvtl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610460" version="1" comment="mhvtl-kmp-default is &lt;1.62_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291410" version="1" comment="mhvtl-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610461" version="1" comment="mhvtl-kmp-preempt is &lt;1.62_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291411" version="1" comment="mhvtl-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610462" version="1" comment="openafs is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291412" version="1" comment="openafs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610463" version="1" comment="openafs-authlibs is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291413" version="1" comment="openafs-authlibs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610464" version="1" comment="openafs-authlibs-devel is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291414" version="1" comment="openafs-authlibs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610465" version="1" comment="openafs-client is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291415" version="1" comment="openafs-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610466" version="1" comment="openafs-devel is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291416" version="1" comment="openafs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610467" version="1" comment="openafs-fuse_client is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291417" version="1" comment="openafs-fuse_client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610468" version="1" comment="openafs-kernel-source is &lt;1.8.5-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291418" version="1" comment="openafs-kernel-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610469" version="1" comment="openafs-kmp-default is &lt;1.8.5_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291419" version="1" comment="openafs-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610470" version="1" comment="openafs-kmp-preempt is &lt;1.8.5_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291420" version="1" comment="openafs-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610471" version="1" comment="openafs-server is &lt;1.8.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291421" version="1" comment="openafs-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610472" version="1" comment="pcfclock is &lt;0.44-lp152.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153213" version="1" comment="pcfclock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610473" version="1" comment="pcfclock-kmp-default is &lt;0.44_k5.3.18_lp152.36-lp152.4.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153214" version="1" comment="pcfclock-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610474" version="1" comment="pcfclock-kmp-preempt is &lt;0.44_k5.3.18_lp152.36-lp152.4.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291422" version="1" comment="pcfclock-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610475" version="1" comment="python3-virtualbox is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231803" version="1" comment="python3-virtualbox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610476" version="1" comment="rtl8812au is &lt;5.6.4.2+git20200318.49e98ff-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291423" version="1" comment="rtl8812au is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610477" version="1" comment="rtl8812au-kmp-default is &lt;5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291424" version="1" comment="rtl8812au-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610478" version="1" comment="rtl8812au-kmp-preempt is &lt;5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291425" version="1" comment="rtl8812au-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610479" version="1" comment="sysdig is &lt;0.26.5-lp152.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173367" version="1" comment="sysdig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610480" version="1" comment="sysdig-kmp-default is &lt;0.26.5_k5.3.18_lp152.36-lp152.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173368" version="1" comment="sysdig-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610481" version="1" comment="sysdig-kmp-preempt is &lt;0.26.5_k5.3.18_lp152.36-lp152.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291426" version="1" comment="sysdig-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610482" version="1" comment="v4l2loopback-kmp-default is &lt;0.12.5_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291428" version="1" comment="v4l2loopback-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610483" version="1" comment="v4l2loopback-kmp-preempt is &lt;0.12.5_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291429" version="1" comment="v4l2loopback-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610484" version="1" comment="v4l2loopback-utils is &lt;0.12.5-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291430" version="1" comment="v4l2loopback-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610485" version="1" comment="vhba-kmp-default is &lt;20200106_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153218" version="1" comment="vhba-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610486" version="1" comment="vhba-kmp-preempt is &lt;20200106_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291431" version="1" comment="vhba-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610487" version="1" comment="virtualbox is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152062" version="1" comment="virtualbox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610488" version="1" comment="virtualbox-devel is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153267" version="1" comment="virtualbox-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610489" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.10-lp152.2.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153268" version="1" comment="virtualbox-guest-desktop-icons is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610490" version="1" comment="virtualbox-guest-source is &lt;6.1.10-lp152.2.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166864" version="1" comment="virtualbox-guest-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610491" version="1" comment="virtualbox-guest-tools is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152064" version="1" comment="virtualbox-guest-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610492" version="1" comment="virtualbox-guest-x11 is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152065" version="1" comment="virtualbox-guest-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610493" version="1" comment="virtualbox-host-source is &lt;6.1.10-lp152.2.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153269" version="1" comment="virtualbox-host-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610494" version="1" comment="virtualbox-kmp-default is &lt;6.1.10_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286913" version="1" comment="virtualbox-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610495" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.10_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291432" version="1" comment="virtualbox-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610496" version="1" comment="virtualbox-qt is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152067" version="1" comment="virtualbox-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610497" version="1" comment="virtualbox-vnc is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166871" version="1" comment="virtualbox-vnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610498" version="1" comment="virtualbox-websrv is &lt;6.1.10-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153270" version="1" comment="virtualbox-websrv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610499" version="1" comment="xtables-addons is &lt;3.9-lp152.2.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173369" version="1" comment="xtables-addons is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610500" version="1" comment="xtables-addons-kmp-default is &lt;3.9_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173370" version="1" comment="xtables-addons-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610501" version="1" comment="xtables-addons-kmp-preempt is &lt;3.9_k5.3.18_lp152.36-lp152.2.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291433" version="1" comment="xtables-addons-kmp-preempt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611403" version="1" comment="kernel-debug is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611404" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611405" version="1" comment="kernel-default is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611406" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.44.1.lp152.8.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611407" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.44.1.lp152.8.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611408" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611409" version="1" comment="kernel-devel is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611410" version="1" comment="kernel-docs is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611411" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611412" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611413" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611414" version="1" comment="kernel-macros is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611415" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611416" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611417" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611418" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611419" version="1" comment="kernel-source is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611420" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611421" version="1" comment="kernel-syms is &lt;5.3.18-lp152.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614229" version="1" comment="kernel-debug is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614230" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614231" version="1" comment="kernel-default is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614232" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614233" version="1" comment="kernel-devel is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614234" version="1" comment="kernel-docs is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614235" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614236" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614237" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614238" version="1" comment="kernel-macros is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614239" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614240" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614241" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614242" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614243" version="1" comment="kernel-source is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614244" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614245" version="1" comment="kernel-syms is &lt;5.3.18-lp152.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612612" version="1" comment="flac is &lt;1.3.2-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152521" version="1" comment="flac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612613" version="1" comment="flac-devel is &lt;1.3.2-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152522" version="1" comment="flac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612614" version="1" comment="flac-devel-32bit is &lt;1.3.2-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175207" version="1" comment="flac-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612615" version="1" comment="flac-doc is &lt;1.3.2-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175208" version="1" comment="flac-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612616" version="1" comment="libFLAC++6 is &lt;1.3.2-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152523" version="1" comment="libFLAC++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612617" version="1" comment="libFLAC++6-32bit is &lt;1.3.2-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175209" version="1" comment="libFLAC++6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612618" version="1" comment="libFLAC8 is &lt;1.3.2-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152524" version="1" comment="libFLAC8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612619" version="1" comment="libFLAC8-32bit is &lt;1.3.2-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152525" version="1" comment="libFLAC8-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612819" version="1" comment="xen is &lt;4.13.1_04-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151587" version="1" comment="xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612820" version="1" comment="xen-devel is &lt;4.13.1_04-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151929" version="1" comment="xen-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612821" version="1" comment="xen-doc-html is &lt;4.13.1_04-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151588" version="1" comment="xen-doc-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612822" version="1" comment="xen-libs is &lt;4.13.1_04-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612823" version="1" comment="xen-libs-32bit is &lt;4.13.1_04-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151930" version="1" comment="xen-libs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612824" version="1" comment="xen-tools is &lt;4.13.1_04-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151591" version="1" comment="xen-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612825" version="1" comment="xen-tools-domU is &lt;4.13.1_04-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151592" version="1" comment="xen-tools-domU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612826" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_04-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291434" version="1" comment="xen-tools-xendomains-wait-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612649" version="1" comment="bluez is &lt;5.48-lp152.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165944" version="1" comment="bluez is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612650" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp152.12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242424" version="1" comment="bluez-auto-enable-devices is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612651" version="1" comment="bluez-cups is &lt;5.48-lp152.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165946" version="1" comment="bluez-cups is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612652" version="1" comment="bluez-devel is &lt;5.48-lp152.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165948" version="1" comment="bluez-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612653" version="1" comment="bluez-devel-32bit is &lt;5.48-lp152.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165950" version="1" comment="bluez-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612654" version="1" comment="bluez-test is &lt;5.48-lp152.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165952" version="1" comment="bluez-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612655" version="1" comment="libbluetooth3 is &lt;5.48-lp152.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165954" version="1" comment="libbluetooth3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612656" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp152.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165956" version="1" comment="libbluetooth3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615257" version="1" comment="tor is &lt;0.4.4.6-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153574" version="1" comment="tor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611948" version="1" comment="u-boot-tools is &lt;2020.01-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267105" version="1" comment="u-boot-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610771" version="1" comment="ctdb is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610772" version="1" comment="ctdb-pcp-pmda is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610773" version="1" comment="ctdb-tests is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610774" version="1" comment="ldb-tools is &lt;2.0.12-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152723" version="1" comment="ldb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610775" version="1" comment="libdcerpc-binding0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610776" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610777" version="1" comment="libdcerpc-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610778" version="1" comment="libdcerpc-samr-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610779" version="1" comment="libdcerpc-samr0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610780" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610781" version="1" comment="libdcerpc0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610782" version="1" comment="libdcerpc0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610783" version="1" comment="libldb-devel is &lt;2.0.12-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152732" version="1" comment="libldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610784" version="1" comment="libldb2 is &lt;2.0.12-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291435" version="1" comment="libldb2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610785" version="1" comment="libldb2-32bit is &lt;2.0.12-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291436" version="1" comment="libldb2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610786" version="1" comment="libndr-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610787" version="1" comment="libndr-krb5pac-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610788" version="1" comment="libndr-krb5pac0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610789" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610790" version="1" comment="libndr-nbt-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610791" version="1" comment="libndr-nbt0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610792" version="1" comment="libndr-nbt0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610793" version="1" comment="libndr-standard-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610794" version="1" comment="libndr-standard0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610795" version="1" comment="libndr-standard0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610796" version="1" comment="libndr0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610797" version="1" comment="libndr0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610798" version="1" comment="libnetapi-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610799" version="1" comment="libnetapi-devel-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610800" version="1" comment="libnetapi0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610801" version="1" comment="libnetapi0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610802" version="1" comment="libsamba-credentials-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610803" version="1" comment="libsamba-credentials0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610804" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610805" version="1" comment="libsamba-errors-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610806" version="1" comment="libsamba-errors0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610807" version="1" comment="libsamba-errors0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610808" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610809" version="1" comment="libsamba-hostconfig0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610810" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610811" version="1" comment="libsamba-passdb-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610812" version="1" comment="libsamba-passdb0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610813" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610814" version="1" comment="libsamba-policy-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610815" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610816" version="1" comment="libsamba-policy0-python3 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610817" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610818" version="1" comment="libsamba-util-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610819" version="1" comment="libsamba-util0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610820" version="1" comment="libsamba-util0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610821" version="1" comment="libsamdb-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610822" version="1" comment="libsamdb0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610823" version="1" comment="libsamdb0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610824" version="1" comment="libsmbclient-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610825" version="1" comment="libsmbclient0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610826" version="1" comment="libsmbclient0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610827" version="1" comment="libsmbconf-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610828" version="1" comment="libsmbconf0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610829" version="1" comment="libsmbconf0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610830" version="1" comment="libsmbldap-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610831" version="1" comment="libsmbldap2 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610832" version="1" comment="libsmbldap2-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610833" version="1" comment="libtevent-util-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610834" version="1" comment="libtevent-util0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610835" version="1" comment="libtevent-util0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610836" version="1" comment="libwbclient-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610837" version="1" comment="libwbclient0 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610838" version="1" comment="libwbclient0-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610839" version="1" comment="python3-ldb is &lt;2.0.12-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247520" version="1" comment="python3-ldb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610840" version="1" comment="python3-ldb-32bit is &lt;2.0.12-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247521" version="1" comment="python3-ldb-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610841" version="1" comment="python3-ldb-devel is &lt;2.0.12-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247522" version="1" comment="python3-ldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610842" version="1" comment="samba is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610843" version="1" comment="samba-ad-dc is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610844" version="1" comment="samba-ad-dc-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610845" version="1" comment="samba-ceph is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610846" version="1" comment="samba-client is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610847" version="1" comment="samba-client-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610848" version="1" comment="samba-core-devel is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610849" version="1" comment="samba-doc is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610850" version="1" comment="samba-dsdb-modules is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610851" version="1" comment="samba-libs is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610852" version="1" comment="samba-libs-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610853" version="1" comment="samba-libs-python3 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610854" version="1" comment="samba-libs-python3-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610855" version="1" comment="samba-python3 is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610856" version="1" comment="samba-test is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610857" version="1" comment="samba-winbind is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610858" version="1" comment="samba-winbind-32bit is &lt;4.11.11+git.180.2cf3b203f07-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610290" version="1" comment="grub2 is &lt;2.04-lp152.7.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610291" version="1" comment="grub2-branding-upstream is &lt;2.04-lp152.7.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153176" version="1" comment="grub2-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610292" version="1" comment="grub2-i386-efi is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153177" version="1" comment="grub2-i386-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610293" version="1" comment="grub2-i386-efi-debug is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291437" version="1" comment="grub2-i386-efi-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610294" version="1" comment="grub2-i386-pc is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610295" version="1" comment="grub2-i386-pc-debug is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291438" version="1" comment="grub2-i386-pc-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610296" version="1" comment="grub2-i386-xen is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289024" version="1" comment="grub2-i386-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610297" version="1" comment="grub2-snapper-plugin is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610298" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154139" version="1" comment="grub2-systemd-sleep-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610299" version="1" comment="grub2-x86_64-efi is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610300" version="1" comment="grub2-x86_64-efi-debug is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291439" version="1" comment="grub2-x86_64-efi-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610301" version="1" comment="grub2-x86_64-xen is &lt;2.04-lp152.7.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610125" version="1" comment="cni-plugins is &lt;0.8.6-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280794" version="1" comment="cni-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612827" version="1" comment="slirp4netns is &lt;0.4.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266793" version="1" comment="slirp4netns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613996" version="1" comment="dfu-tool is &lt;1.2.14-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286264" version="1" comment="dfu-tool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613997" version="1" comment="fwupd is &lt;1.2.14-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286265" version="1" comment="fwupd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613998" version="1" comment="fwupd-devel is &lt;1.2.14-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286266" version="1" comment="fwupd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613999" version="1" comment="fwupd-lang is &lt;1.2.14-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286267" version="1" comment="fwupd-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614000" version="1" comment="libfwupd2 is &lt;1.2.14-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286268" version="1" comment="libfwupd2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614001" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.2.14-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286269" version="1" comment="typelib-1_0-Fwupd-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610165" version="1" comment="qemu is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610166" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610167" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610168" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610169" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610170" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610171" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610172" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610173" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610174" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610175" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610176" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610177" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610178" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610179" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610180" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610181" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610182" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610183" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610184" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610185" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610186" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610187" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610188" version="1" comment="qemu-sgabios is &lt;8-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610189" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610190" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610191" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610192" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610193" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610194" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610195" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610196" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610197" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613573" version="1" comment="libmbedcrypto3 is &lt;2.16.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346906" version="1" comment="libmbedcrypto3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613574" version="1" comment="libmbedcrypto3-32bit is &lt;2.16.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346907" version="1" comment="libmbedcrypto3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613575" version="1" comment="libmbedtls12 is &lt;2.16.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346908" version="1" comment="libmbedtls12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613576" version="1" comment="libmbedtls12-32bit is &lt;2.16.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346909" version="1" comment="libmbedtls12-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613577" version="1" comment="libmbedx509-0 is &lt;2.16.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346910" version="1" comment="libmbedx509-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613578" version="1" comment="libmbedx509-0-32bit is &lt;2.16.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346911" version="1" comment="libmbedx509-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613579" version="1" comment="mbedtls-devel is &lt;2.16.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152976" version="1" comment="mbedtls-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615258" version="1" comment="cacti is &lt;1.2.13-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152167" version="1" comment="cacti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615259" version="1" comment="cacti-spine is &lt;1.2.13-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153174" version="1" comment="cacti-spine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615260" version="1" comment="otrs is &lt;6.0.30-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615261" version="1" comment="otrs-doc is &lt;6.0.30-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615262" version="1" comment="otrs-itsm is &lt;6.0.30-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609983" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.5-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287506" version="1" comment="ruby2.5-rubygem-puma is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609984" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.5-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287507" version="1" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614743" version="1" comment="python2-httplib2 is &lt;0.19.0-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475569" version="1" comment="python2-httplib2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614744" version="1" comment="python3-httplib2 is &lt;0.19.0-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475570" version="1" comment="python3-httplib2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613822" version="1" comment="libnghttp2-14 is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613823" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613824" version="1" comment="libnghttp2-devel is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613825" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613826" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613827" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613828" version="1" comment="nghttp2 is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613829" version="1" comment="python3-nghttp2 is &lt;1.40.0-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610346" version="1" comment="libwireshark13 is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280475" version="1" comment="libwireshark13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610347" version="1" comment="libwiretap10 is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280476" version="1" comment="libwiretap10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610348" version="1" comment="libwsutil11 is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280477" version="1" comment="libwsutil11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610349" version="1" comment="wireshark is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151250" version="1" comment="wireshark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610350" version="1" comment="wireshark-devel is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153033" version="1" comment="wireshark-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610351" version="1" comment="wireshark-ui-qt is &lt;3.2.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153034" version="1" comment="wireshark-ui-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615263" version="1" comment="zabbix-agent is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294885" version="1" comment="zabbix-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615264" version="1" comment="zabbix-bash-completion is &lt;3.0.31-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294887" version="1" comment="zabbix-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615265" version="1" comment="zabbix-java-gateway is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294889" version="1" comment="zabbix-java-gateway is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615266" version="1" comment="zabbix-phpfrontend is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294891" version="1" comment="zabbix-phpfrontend is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615267" version="1" comment="zabbix-proxy is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294893" version="1" comment="zabbix-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615268" version="1" comment="zabbix-proxy-mysql is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294895" version="1" comment="zabbix-proxy-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615269" version="1" comment="zabbix-proxy-postgresql is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294897" version="1" comment="zabbix-proxy-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615270" version="1" comment="zabbix-proxy-sqlite is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294899" version="1" comment="zabbix-proxy-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615271" version="1" comment="zabbix-server is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294901" version="1" comment="zabbix-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615272" version="1" comment="zabbix-server-mysql is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294903" version="1" comment="zabbix-server-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615273" version="1" comment="zabbix-server-postgresql is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294905" version="1" comment="zabbix-server-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615274" version="1" comment="zabbix-server-sqlite is &lt;3.0.31-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294907" version="1" comment="zabbix-server-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615275" version="1" comment="audacity is &lt;2.2.2-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338701" version="1" comment="audacity is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615276" version="1" comment="audacity-lang is &lt;2.2.2-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338703" version="1" comment="audacity-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613444" version="1" comment="qemu is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613445" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613446" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613447" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613448" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613449" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613450" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613451" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613452" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613453" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613454" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613455" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613456" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613457" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613458" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613459" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613460" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613461" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613462" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613463" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613464" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613465" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613466" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613467" version="1" comment="qemu-sgabios is &lt;8-lp152.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613468" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613469" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613470" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613471" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613472" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613473" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613474" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613475" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613476" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610736" version="1" comment="apache2 is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151165" version="1" comment="apache2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610737" version="1" comment="apache2-devel is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151166" version="1" comment="apache2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610738" version="1" comment="apache2-doc is &lt;2.4.43-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151167" version="1" comment="apache2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610739" version="1" comment="apache2-event is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153274" version="1" comment="apache2-event is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610740" version="1" comment="apache2-example-pages is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151168" version="1" comment="apache2-example-pages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610741" version="1" comment="apache2-prefork is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151169" version="1" comment="apache2-prefork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610742" version="1" comment="apache2-utils is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151170" version="1" comment="apache2-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610743" version="1" comment="apache2-worker is &lt;2.4.43-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153275" version="1" comment="apache2-worker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610148" version="1" comment="tomcat is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152844" version="1" comment="tomcat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610149" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152845" version="1" comment="tomcat-admin-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610150" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152846" version="1" comment="tomcat-docs-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610151" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152847" version="1" comment="tomcat-el-3_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610152" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152848" version="1" comment="tomcat-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610153" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152849" version="1" comment="tomcat-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610154" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152850" version="1" comment="tomcat-jsp-2_3-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610155" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152851" version="1" comment="tomcat-jsvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610156" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152852" version="1" comment="tomcat-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610157" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236693" version="1" comment="tomcat-servlet-4_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610158" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152854" version="1" comment="tomcat-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631955" version="1" comment="dbus-1 is &lt;1.12.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151535" version="1" comment="dbus-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631956" version="1" comment="dbus-1-devel is &lt;1.12.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151536" version="1" comment="dbus-1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631957" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258222" version="1" comment="dbus-1-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631958" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-lp152.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258223" version="1" comment="dbus-1-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631959" version="1" comment="dbus-1-x11 is &lt;1.12.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151537" version="1" comment="dbus-1-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631960" version="1" comment="libdbus-1-3 is &lt;1.12.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151538" version="1" comment="libdbus-1-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631961" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151539" version="1" comment="libdbus-1-3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613097" version="1" comment="dovecot23 is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245304" version="1" comment="dovecot23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613098" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245305" version="1" comment="dovecot23-backend-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613099" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245306" version="1" comment="dovecot23-backend-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613100" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245307" version="1" comment="dovecot23-backend-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613101" version="1" comment="dovecot23-devel is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245308" version="1" comment="dovecot23-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613102" version="1" comment="dovecot23-fts is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245309" version="1" comment="dovecot23-fts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613103" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245310" version="1" comment="dovecot23-fts-lucene is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613104" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245311" version="1" comment="dovecot23-fts-solr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613105" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245312" version="1" comment="dovecot23-fts-squat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611666" version="1" comment="mailman is &lt;2.1.34-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151563" version="1" comment="mailman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612053" version="1" comment="kernel-firmware is &lt;20200107-lp152.2.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612054" version="1" comment="ucode-amd is &lt;20200107-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611567" version="1" comment="kernel-debug is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611568" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611569" version="1" comment="kernel-default is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612242" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.50.1.lp152.8.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612243" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.50.1.lp152.8.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611570" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611571" version="1" comment="kernel-devel is &lt;5.3.18-lp152.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611572" version="1" comment="kernel-docs is &lt;5.3.18-lp152.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611573" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611574" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611575" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611576" version="1" comment="kernel-macros is &lt;5.3.18-lp152.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611577" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611578" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611579" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611580" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611581" version="1" comment="kernel-source is &lt;5.3.18-lp152.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611582" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611583" version="1" comment="kernel-syms is &lt;5.3.18-lp152.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613616" version="1" comment="kernel-debug is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613617" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613618" version="1" comment="kernel-default is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613619" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.66.2.lp152.8.23.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613620" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.66.2.lp152.8.23.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613621" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613622" version="1" comment="kernel-devel is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613623" version="1" comment="kernel-docs is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613624" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613673" version="1" comment="kernel-firmware is &lt;20200107-lp152.2.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613625" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613626" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613627" version="1" comment="kernel-macros is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613628" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613629" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613630" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613631" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613632" version="1" comment="kernel-source is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613633" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.66.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613634" version="1" comment="kernel-syms is &lt;5.3.18-lp152.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613674" version="1" comment="ucode-amd is &lt;20200107-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633723" version="1" comment="libfreebl3 is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633724" version="1" comment="libfreebl3-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152810" version="1" comment="libfreebl3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633725" version="1" comment="libfreebl3-hmac is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244408" version="1" comment="libfreebl3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633726" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244409" version="1" comment="libfreebl3-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633727" version="1" comment="libsoftokn3 is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633728" version="1" comment="libsoftokn3-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152811" version="1" comment="libsoftokn3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633729" version="1" comment="libsoftokn3-hmac is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244410" version="1" comment="libsoftokn3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633730" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244411" version="1" comment="libsoftokn3-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633731" version="1" comment="mozilla-nspr is &lt;4.32-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152084" version="1" comment="mozilla-nspr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633732" version="1" comment="mozilla-nspr-32bit is &lt;4.32-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152812" version="1" comment="mozilla-nspr-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633733" version="1" comment="mozilla-nspr-devel is &lt;4.32-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152085" version="1" comment="mozilla-nspr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633734" version="1" comment="mozilla-nss is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633735" version="1" comment="mozilla-nss-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152813" version="1" comment="mozilla-nss-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633736" version="1" comment="mozilla-nss-certs is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633737" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152814" version="1" comment="mozilla-nss-certs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633738" version="1" comment="mozilla-nss-devel is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151502" version="1" comment="mozilla-nss-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633739" version="1" comment="mozilla-nss-sysinit is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152815" version="1" comment="mozilla-nss-sysinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633740" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152816" version="1" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633741" version="1" comment="mozilla-nss-tools is &lt;3.68-lp152.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612813" version="1" comment="MozillaFirefox is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151161" version="1" comment="MozillaFirefox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612814" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152806" version="1" comment="MozillaFirefox-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612815" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152807" version="1" comment="MozillaFirefox-buildsymbols is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612816" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152808" version="1" comment="MozillaFirefox-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612817" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151162" version="1" comment="MozillaFirefox-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612818" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152809" version="1" comment="MozillaFirefox-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612776" version="1" comment="libfreebl3 is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612777" version="1" comment="libfreebl3-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612778" version="1" comment="libfreebl3-hmac is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612779" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612780" version="1" comment="libsoftokn3 is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612781" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612782" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612783" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612784" version="1" comment="mozilla-nss is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612785" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612786" version="1" comment="mozilla-nss-certs is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612787" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612788" version="1" comment="mozilla-nss-devel is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612789" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612790" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612791" version="1" comment="mozilla-nss-tools is &lt;3.53.1-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612810" version="1" comment="MozillaThunderbird is &lt;68.10.0-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151180" version="1" comment="MozillaThunderbird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612811" version="1" comment="MozillaThunderbird-translations-common is &lt;68.10.0-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151181" version="1" comment="MozillaThunderbird-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612812" version="1" comment="MozillaThunderbird-translations-other is &lt;68.10.0-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152805" version="1" comment="MozillaThunderbird-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614002" version="1" comment="gssproxy is &lt;0.8.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350895" version="1" comment="gssproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610675" version="1" comment="dovecot23 is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610676" version="1" comment="dovecot23-backend-mysql is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610677" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610678" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610679" version="1" comment="dovecot23-devel is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610680" version="1" comment="dovecot23-fts is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610681" version="1" comment="dovecot23-fts-lucene is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610682" version="1" comment="dovecot23-fts-solr is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610683" version="1" comment="dovecot23-fts-squat is &lt;2.3.10-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611128" version="1" comment="libpmi0 is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230283" version="1" comment="libpmi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611129" version="1" comment="libslurm33 is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266850" version="1" comment="libslurm33 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611130" version="1" comment="perl-slurm is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230285" version="1" comment="perl-slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611131" version="1" comment="slurm is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230286" version="1" comment="slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611132" version="1" comment="slurm-auth-none is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230287" version="1" comment="slurm-auth-none is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611133" version="1" comment="slurm-config is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230288" version="1" comment="slurm-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611134" version="1" comment="slurm-config-man is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266851" version="1" comment="slurm-config-man is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611135" version="1" comment="slurm-cray is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266852" version="1" comment="slurm-cray is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611136" version="1" comment="slurm-devel is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230289" version="1" comment="slurm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611137" version="1" comment="slurm-doc is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230290" version="1" comment="slurm-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611138" version="1" comment="slurm-hdf5 is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266853" version="1" comment="slurm-hdf5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611139" version="1" comment="slurm-lua is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230291" version="1" comment="slurm-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611140" version="1" comment="slurm-munge is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230292" version="1" comment="slurm-munge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611141" version="1" comment="slurm-node is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230293" version="1" comment="slurm-node is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611142" version="1" comment="slurm-openlava is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230294" version="1" comment="slurm-openlava is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611143" version="1" comment="slurm-pam_slurm is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230295" version="1" comment="slurm-pam_slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611144" version="1" comment="slurm-plugins is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230296" version="1" comment="slurm-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611145" version="1" comment="slurm-seff is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230297" version="1" comment="slurm-seff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611146" version="1" comment="slurm-sjstat is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230298" version="1" comment="slurm-sjstat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611147" version="1" comment="slurm-slurmdbd is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230299" version="1" comment="slurm-slurmdbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611148" version="1" comment="slurm-sql is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230300" version="1" comment="slurm-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611149" version="1" comment="slurm-sview is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230301" version="1" comment="slurm-sview is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611150" version="1" comment="slurm-torque is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230302" version="1" comment="slurm-torque is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611151" version="1" comment="slurm-webdoc is &lt;18.08.9-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276533" version="1" comment="slurm-webdoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612356" version="1" comment="minidlna is &lt;1.3.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334739" version="1" comment="minidlna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610129" version="1" comment="kernel-debug is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610130" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610131" version="1" comment="kernel-default is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610132" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.33.1.lp152.8.4.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610133" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.33.1.lp152.8.4.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610134" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610135" version="1" comment="kernel-devel is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610136" version="1" comment="kernel-docs is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610137" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610138" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610139" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610140" version="1" comment="kernel-macros is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610141" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610142" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610143" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610144" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610145" version="1" comment="kernel-source is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610146" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610147" version="1" comment="kernel-syms is &lt;5.3.18-lp152.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610532" version="1" comment="libreoffice is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151462" version="1" comment="libreoffice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610533" version="1" comment="libreoffice-base is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151463" version="1" comment="libreoffice-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610534" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233578" version="1" comment="libreoffice-base-drivers-firebird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610535" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153330" version="1" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610536" version="1" comment="libreoffice-branding-upstream is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151465" version="1" comment="libreoffice-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610537" version="1" comment="libreoffice-calc is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151466" version="1" comment="libreoffice-calc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610538" version="1" comment="libreoffice-calc-extensions is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151467" version="1" comment="libreoffice-calc-extensions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610539" version="1" comment="libreoffice-draw is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151468" version="1" comment="libreoffice-draw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610540" version="1" comment="libreoffice-filters-optional is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151469" version="1" comment="libreoffice-filters-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610541" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153331" version="1" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610542" version="1" comment="libreoffice-glade is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153332" version="1" comment="libreoffice-glade is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610543" version="1" comment="libreoffice-gnome is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151470" version="1" comment="libreoffice-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610544" version="1" comment="libreoffice-gtk3 is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153333" version="1" comment="libreoffice-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610545" version="1" comment="libreoffice-icon-themes is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009176160" version="1" comment="libreoffice-icon-themes is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610546" version="1" comment="libreoffice-impress is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151477" version="1" comment="libreoffice-impress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610547" version="1" comment="libreoffice-l10n-af is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153334" version="1" comment="libreoffice-l10n-af is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610548" version="1" comment="libreoffice-l10n-am is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239716" version="1" comment="libreoffice-l10n-am is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610549" version="1" comment="libreoffice-l10n-ar is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153335" version="1" comment="libreoffice-l10n-ar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610550" version="1" comment="libreoffice-l10n-as is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153336" version="1" comment="libreoffice-l10n-as is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610551" version="1" comment="libreoffice-l10n-ast is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239717" version="1" comment="libreoffice-l10n-ast is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610552" version="1" comment="libreoffice-l10n-be is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239718" version="1" comment="libreoffice-l10n-be is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610553" version="1" comment="libreoffice-l10n-bg is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153337" version="1" comment="libreoffice-l10n-bg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610554" version="1" comment="libreoffice-l10n-bn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153338" version="1" comment="libreoffice-l10n-bn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610555" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239719" version="1" comment="libreoffice-l10n-bn_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610556" version="1" comment="libreoffice-l10n-bo is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239720" version="1" comment="libreoffice-l10n-bo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610557" version="1" comment="libreoffice-l10n-br is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153339" version="1" comment="libreoffice-l10n-br is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610558" version="1" comment="libreoffice-l10n-brx is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239721" version="1" comment="libreoffice-l10n-brx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610559" version="1" comment="libreoffice-l10n-bs is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239722" version="1" comment="libreoffice-l10n-bs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610560" version="1" comment="libreoffice-l10n-ca is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153340" version="1" comment="libreoffice-l10n-ca is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610561" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239723" version="1" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610562" version="1" comment="libreoffice-l10n-cs is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151479" version="1" comment="libreoffice-l10n-cs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610563" version="1" comment="libreoffice-l10n-cy is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153341" version="1" comment="libreoffice-l10n-cy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610564" version="1" comment="libreoffice-l10n-da is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151480" version="1" comment="libreoffice-l10n-da is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610565" version="1" comment="libreoffice-l10n-de is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151481" version="1" comment="libreoffice-l10n-de is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610566" version="1" comment="libreoffice-l10n-dgo is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239724" version="1" comment="libreoffice-l10n-dgo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610567" version="1" comment="libreoffice-l10n-dsb is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262204" version="1" comment="libreoffice-l10n-dsb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610568" version="1" comment="libreoffice-l10n-dz is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153342" version="1" comment="libreoffice-l10n-dz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610569" version="1" comment="libreoffice-l10n-el is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151482" version="1" comment="libreoffice-l10n-el is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610570" version="1" comment="libreoffice-l10n-en is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151483" version="1" comment="libreoffice-l10n-en is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610571" version="1" comment="libreoffice-l10n-en_GB is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239725" version="1" comment="libreoffice-l10n-en_GB is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610572" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239726" version="1" comment="libreoffice-l10n-en_ZA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610573" version="1" comment="libreoffice-l10n-eo is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171437" version="1" comment="libreoffice-l10n-eo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610574" version="1" comment="libreoffice-l10n-es is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151484" version="1" comment="libreoffice-l10n-es is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610575" version="1" comment="libreoffice-l10n-et is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153343" version="1" comment="libreoffice-l10n-et is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610576" version="1" comment="libreoffice-l10n-eu is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153344" version="1" comment="libreoffice-l10n-eu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610577" version="1" comment="libreoffice-l10n-fa is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153345" version="1" comment="libreoffice-l10n-fa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610578" version="1" comment="libreoffice-l10n-fi is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153346" version="1" comment="libreoffice-l10n-fi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610579" version="1" comment="libreoffice-l10n-fr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151485" version="1" comment="libreoffice-l10n-fr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610580" version="1" comment="libreoffice-l10n-fy is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239727" version="1" comment="libreoffice-l10n-fy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610581" version="1" comment="libreoffice-l10n-ga is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153347" version="1" comment="libreoffice-l10n-ga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610582" version="1" comment="libreoffice-l10n-gd is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239728" version="1" comment="libreoffice-l10n-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610583" version="1" comment="libreoffice-l10n-gl is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153348" version="1" comment="libreoffice-l10n-gl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610584" version="1" comment="libreoffice-l10n-gu is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153349" version="1" comment="libreoffice-l10n-gu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610585" version="1" comment="libreoffice-l10n-gug is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239729" version="1" comment="libreoffice-l10n-gug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610586" version="1" comment="libreoffice-l10n-he is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153350" version="1" comment="libreoffice-l10n-he is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610587" version="1" comment="libreoffice-l10n-hi is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153351" version="1" comment="libreoffice-l10n-hi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610588" version="1" comment="libreoffice-l10n-hr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153352" version="1" comment="libreoffice-l10n-hr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610589" version="1" comment="libreoffice-l10n-hsb is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239730" version="1" comment="libreoffice-l10n-hsb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610590" version="1" comment="libreoffice-l10n-hu is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151486" version="1" comment="libreoffice-l10n-hu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610591" version="1" comment="libreoffice-l10n-id is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239731" version="1" comment="libreoffice-l10n-id is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610592" version="1" comment="libreoffice-l10n-is is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239732" version="1" comment="libreoffice-l10n-is is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610593" version="1" comment="libreoffice-l10n-it is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151487" version="1" comment="libreoffice-l10n-it is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610594" version="1" comment="libreoffice-l10n-ja is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151488" version="1" comment="libreoffice-l10n-ja is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610595" version="1" comment="libreoffice-l10n-ka is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239733" version="1" comment="libreoffice-l10n-ka is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610596" version="1" comment="libreoffice-l10n-kab is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239734" version="1" comment="libreoffice-l10n-kab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610597" version="1" comment="libreoffice-l10n-kk is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153353" version="1" comment="libreoffice-l10n-kk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610598" version="1" comment="libreoffice-l10n-km is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239735" version="1" comment="libreoffice-l10n-km is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610599" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239736" version="1" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610600" version="1" comment="libreoffice-l10n-kn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153354" version="1" comment="libreoffice-l10n-kn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610601" version="1" comment="libreoffice-l10n-ko is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153355" version="1" comment="libreoffice-l10n-ko is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610602" version="1" comment="libreoffice-l10n-kok is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239737" version="1" comment="libreoffice-l10n-kok is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610603" version="1" comment="libreoffice-l10n-ks is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239738" version="1" comment="libreoffice-l10n-ks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610604" version="1" comment="libreoffice-l10n-lb is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239739" version="1" comment="libreoffice-l10n-lb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610605" version="1" comment="libreoffice-l10n-lo is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239740" version="1" comment="libreoffice-l10n-lo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610606" version="1" comment="libreoffice-l10n-lt is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153356" version="1" comment="libreoffice-l10n-lt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610607" version="1" comment="libreoffice-l10n-lv is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153357" version="1" comment="libreoffice-l10n-lv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610608" version="1" comment="libreoffice-l10n-mai is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153358" version="1" comment="libreoffice-l10n-mai is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610609" version="1" comment="libreoffice-l10n-mk is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239741" version="1" comment="libreoffice-l10n-mk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610610" version="1" comment="libreoffice-l10n-ml is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153359" version="1" comment="libreoffice-l10n-ml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610611" version="1" comment="libreoffice-l10n-mn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239742" version="1" comment="libreoffice-l10n-mn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610612" version="1" comment="libreoffice-l10n-mni is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239743" version="1" comment="libreoffice-l10n-mni is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610613" version="1" comment="libreoffice-l10n-mr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153360" version="1" comment="libreoffice-l10n-mr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610614" version="1" comment="libreoffice-l10n-my is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239744" version="1" comment="libreoffice-l10n-my is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610615" version="1" comment="libreoffice-l10n-nb is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153361" version="1" comment="libreoffice-l10n-nb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610616" version="1" comment="libreoffice-l10n-ne is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239745" version="1" comment="libreoffice-l10n-ne is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610617" version="1" comment="libreoffice-l10n-nl is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153362" version="1" comment="libreoffice-l10n-nl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610618" version="1" comment="libreoffice-l10n-nn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153363" version="1" comment="libreoffice-l10n-nn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610619" version="1" comment="libreoffice-l10n-nr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153364" version="1" comment="libreoffice-l10n-nr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610620" version="1" comment="libreoffice-l10n-nso is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153365" version="1" comment="libreoffice-l10n-nso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610621" version="1" comment="libreoffice-l10n-oc is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239746" version="1" comment="libreoffice-l10n-oc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610622" version="1" comment="libreoffice-l10n-om is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239747" version="1" comment="libreoffice-l10n-om is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610623" version="1" comment="libreoffice-l10n-or is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153366" version="1" comment="libreoffice-l10n-or is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610624" version="1" comment="libreoffice-l10n-pa is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153367" version="1" comment="libreoffice-l10n-pa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610625" version="1" comment="libreoffice-l10n-pl is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151489" version="1" comment="libreoffice-l10n-pl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610626" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158758" version="1" comment="libreoffice-l10n-pt_BR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610627" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158759" version="1" comment="libreoffice-l10n-pt_PT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610628" version="1" comment="libreoffice-l10n-ro is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153370" version="1" comment="libreoffice-l10n-ro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610629" version="1" comment="libreoffice-l10n-ru is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151490" version="1" comment="libreoffice-l10n-ru is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610630" version="1" comment="libreoffice-l10n-rw is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239748" version="1" comment="libreoffice-l10n-rw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610631" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239749" version="1" comment="libreoffice-l10n-sa_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610632" version="1" comment="libreoffice-l10n-sat is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239750" version="1" comment="libreoffice-l10n-sat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610633" version="1" comment="libreoffice-l10n-sd is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239751" version="1" comment="libreoffice-l10n-sd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610634" version="1" comment="libreoffice-l10n-si is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153371" version="1" comment="libreoffice-l10n-si is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610635" version="1" comment="libreoffice-l10n-sid is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239752" version="1" comment="libreoffice-l10n-sid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610636" version="1" comment="libreoffice-l10n-sk is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153372" version="1" comment="libreoffice-l10n-sk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610637" version="1" comment="libreoffice-l10n-sl is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153373" version="1" comment="libreoffice-l10n-sl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610638" version="1" comment="libreoffice-l10n-sq is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239753" version="1" comment="libreoffice-l10n-sq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610639" version="1" comment="libreoffice-l10n-sr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153374" version="1" comment="libreoffice-l10n-sr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610640" version="1" comment="libreoffice-l10n-ss is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153375" version="1" comment="libreoffice-l10n-ss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610641" version="1" comment="libreoffice-l10n-st is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153376" version="1" comment="libreoffice-l10n-st is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610642" version="1" comment="libreoffice-l10n-sv is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153377" version="1" comment="libreoffice-l10n-sv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610643" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239754" version="1" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610644" version="1" comment="libreoffice-l10n-szl is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275306" version="1" comment="libreoffice-l10n-szl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610645" version="1" comment="libreoffice-l10n-ta is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153378" version="1" comment="libreoffice-l10n-ta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610646" version="1" comment="libreoffice-l10n-te is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153379" version="1" comment="libreoffice-l10n-te is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610647" version="1" comment="libreoffice-l10n-tg is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239755" version="1" comment="libreoffice-l10n-tg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610648" version="1" comment="libreoffice-l10n-th is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153380" version="1" comment="libreoffice-l10n-th is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610649" version="1" comment="libreoffice-l10n-tn is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153381" version="1" comment="libreoffice-l10n-tn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610650" version="1" comment="libreoffice-l10n-tr is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153382" version="1" comment="libreoffice-l10n-tr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610651" version="1" comment="libreoffice-l10n-ts is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153383" version="1" comment="libreoffice-l10n-ts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610652" version="1" comment="libreoffice-l10n-tt is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239756" version="1" comment="libreoffice-l10n-tt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610653" version="1" comment="libreoffice-l10n-ug is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239757" version="1" comment="libreoffice-l10n-ug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610654" version="1" comment="libreoffice-l10n-uk is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153384" version="1" comment="libreoffice-l10n-uk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610655" version="1" comment="libreoffice-l10n-uz is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239758" version="1" comment="libreoffice-l10n-uz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610656" version="1" comment="libreoffice-l10n-ve is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153385" version="1" comment="libreoffice-l10n-ve is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610657" version="1" comment="libreoffice-l10n-vec is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239759" version="1" comment="libreoffice-l10n-vec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610658" version="1" comment="libreoffice-l10n-vi is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239760" version="1" comment="libreoffice-l10n-vi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610659" version="1" comment="libreoffice-l10n-xh is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153386" version="1" comment="libreoffice-l10n-xh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610660" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158760" version="1" comment="libreoffice-l10n-zh_CN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610661" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158761" version="1" comment="libreoffice-l10n-zh_TW is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610662" version="1" comment="libreoffice-l10n-zu is &lt;6.4.5.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153389" version="1" comment="libreoffice-l10n-zu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610663" version="1" comment="libreoffice-librelogo is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275307" version="1" comment="libreoffice-librelogo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610664" version="1" comment="libreoffice-mailmerge is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151491" version="1" comment="libreoffice-mailmerge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610665" version="1" comment="libreoffice-math is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151492" version="1" comment="libreoffice-math is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610666" version="1" comment="libreoffice-officebean is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153390" version="1" comment="libreoffice-officebean is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610667" version="1" comment="libreoffice-pyuno is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151493" version="1" comment="libreoffice-pyuno is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610668" version="1" comment="libreoffice-qt5 is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239761" version="1" comment="libreoffice-qt5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610669" version="1" comment="libreoffice-sdk is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153391" version="1" comment="libreoffice-sdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610670" version="1" comment="libreoffice-sdk-doc is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153392" version="1" comment="libreoffice-sdk-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610671" version="1" comment="libreoffice-writer is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151494" version="1" comment="libreoffice-writer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610672" version="1" comment="libreoffice-writer-extensions is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151495" version="1" comment="libreoffice-writer-extensions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610673" version="1" comment="libreofficekit is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153393" version="1" comment="libreofficekit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610674" version="1" comment="libreofficekit-devel is &lt;6.4.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153394" version="1" comment="libreofficekit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610115" version="1" comment="openconnect is &lt;7.08-lp152.9.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151736" version="1" comment="openconnect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610116" version="1" comment="openconnect-devel is &lt;7.08-lp152.9.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151737" version="1" comment="openconnect-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610117" version="1" comment="openconnect-doc is &lt;7.08-lp152.9.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268921" version="1" comment="openconnect-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610118" version="1" comment="openconnect-lang is &lt;7.08-lp152.9.4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177178" version="1" comment="openconnect-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633711" version="1" comment="libcroco is &lt;0.6.13-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257312" version="1" comment="libcroco is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633712" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177260" version="1" comment="libcroco-0_6-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633713" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.13-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177261" version="1" comment="libcroco-0_6-3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633714" version="1" comment="libcroco-devel is &lt;0.6.13-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257313" version="1" comment="libcroco-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614246" version="1" comment="qemu is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614247" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614248" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614249" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614250" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614251" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614252" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614253" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614254" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614255" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614256" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614257" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614258" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614259" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614260" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614261" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614262" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614263" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614264" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614265" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614266" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614267" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614268" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614269" version="1" comment="qemu-sgabios is &lt;8-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614270" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614271" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614272" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614273" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614274" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614275" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614276" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614277" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614278" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611792" version="1" comment="sane-backends is &lt;1.0.31-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154031" version="1" comment="sane-backends is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611793" version="1" comment="sane-backends-32bit is &lt;1.0.31-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154032" version="1" comment="sane-backends-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611794" version="1" comment="sane-backends-autoconfig is &lt;1.0.31-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154033" version="1" comment="sane-backends-autoconfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611795" version="1" comment="sane-backends-devel is &lt;1.0.31-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154034" version="1" comment="sane-backends-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611796" version="1" comment="sane-backends-devel-32bit is &lt;1.0.31-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297781" version="1" comment="sane-backends-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615172" version="1" comment="libvlc5 is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153021" version="1" comment="libvlc5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615173" version="1" comment="libvlccore9 is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261716" version="1" comment="libvlccore9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615174" version="1" comment="vlc is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153023" version="1" comment="vlc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615175" version="1" comment="vlc-codec-gstreamer is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164833" version="1" comment="vlc-codec-gstreamer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615176" version="1" comment="vlc-devel is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153024" version="1" comment="vlc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615177" version="1" comment="vlc-jack is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261717" version="1" comment="vlc-jack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615178" version="1" comment="vlc-lang is &lt;3.0.11.1-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164834" version="1" comment="vlc-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615179" version="1" comment="vlc-noX is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153026" version="1" comment="vlc-noX is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615180" version="1" comment="vlc-opencv is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281885" version="1" comment="vlc-opencv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615181" version="1" comment="vlc-qt is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153028" version="1" comment="vlc-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615182" version="1" comment="vlc-vdpau is &lt;3.0.11.1-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261718" version="1" comment="vlc-vdpau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634040" version="1" comment="grafana-piechart-panel is &lt;1.6.1-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612500" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152638" version="1" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612501" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.30.3-lp152.2.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152639" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612502" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152640" version="1" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612503" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.30.3-lp152.2.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152641" version="1" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612504" version="1" comment="libwebkit2gtk3-lang is &lt;2.30.3-lp152.2.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152642" version="1" comment="libwebkit2gtk3-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612505" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152643" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612506" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152644" version="1" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612507" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152645" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612508" version="1" comment="webkit-jsc-4 is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152646" version="1" comment="webkit-jsc-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612509" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152647" version="1" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612510" version="1" comment="webkit2gtk3-devel is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152649" version="1" comment="webkit2gtk3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612511" version="1" comment="webkit2gtk3-minibrowser is &lt;2.30.3-lp152.2.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243274" version="1" comment="webkit2gtk3-minibrowser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613545" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613546" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.30.5-lp152.2.10.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613547" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613548" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.30.5-lp152.2.10.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613549" version="1" comment="libwebkit2gtk3-lang is &lt;2.30.5-lp152.2.10.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613550" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613551" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613552" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613553" version="1" comment="webkit-jsc-4 is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613554" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613555" version="1" comment="webkit2gtk3-devel is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613556" version="1" comment="webkit2gtk3-minibrowser is &lt;2.30.5-lp152.2.10.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614335" version="1" comment="gsoap-devel is &lt;2.8.102-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159475" version="1" comment="gsoap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614336" version="1" comment="gsoap-doc is &lt;2.8.102-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159622" version="1" comment="gsoap-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614337" version="1" comment="libgsoap-2_8_102 is &lt;2.8.102-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353378" version="1" comment="libgsoap-2_8_102 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628183" version="1" comment="balsa is &lt;2.6.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289523" version="1" comment="balsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628184" version="1" comment="balsa-lang is &lt;2.6.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289524" version="1" comment="balsa-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659463" version="1" comment="glib-networking is &lt;2.62.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659232" version="1" comment="glib-networking is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659464" version="1" comment="glib-networking-32bit is &lt;2.62.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659233" version="1" comment="glib-networking-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659465" version="1" comment="glib-networking-lang is &lt;2.62.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659234" version="1" comment="glib-networking-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615145" version="1" comment="python2-rsa is &lt;3.4.2-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479909" version="1" comment="python2-rsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615146" version="1" comment="python3-rsa is &lt;3.4.2-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479910" version="1" comment="python3-rsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611093" version="1" comment="libjpeg-turbo is &lt;1.5.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152540" version="1" comment="libjpeg-turbo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611094" version="1" comment="libjpeg62 is &lt;62.2.0-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152541" version="1" comment="libjpeg62 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611095" version="1" comment="libjpeg62-32bit is &lt;62.2.0-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166381" version="1" comment="libjpeg62-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611096" version="1" comment="libjpeg62-devel is &lt;62.2.0-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152542" version="1" comment="libjpeg62-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611097" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166384" version="1" comment="libjpeg62-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611098" version="1" comment="libjpeg62-turbo is &lt;1.5.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166386" version="1" comment="libjpeg62-turbo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611099" version="1" comment="libjpeg8 is &lt;8.1.2-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152543" version="1" comment="libjpeg8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611100" version="1" comment="libjpeg8-32bit is &lt;8.1.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152544" version="1" comment="libjpeg8-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611101" version="1" comment="libjpeg8-devel is &lt;8.1.2-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166390" version="1" comment="libjpeg8-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611102" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166392" version="1" comment="libjpeg8-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611103" version="1" comment="libturbojpeg0 is &lt;8.1.2-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152545" version="1" comment="libturbojpeg0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611104" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166395" version="1" comment="libturbojpeg0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611510" version="1" comment="cpp10 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296079" version="1" comment="cpp10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612469" version="1" comment="cpp7 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268648" version="1" comment="cpp7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611511" version="1" comment="cross-nvptx-gcc10 is &lt;10.2.1+git583-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296080" version="1" comment="cross-nvptx-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611512" version="1" comment="cross-nvptx-newlib10-devel is &lt;10.2.1+git583-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296081" version="1" comment="cross-nvptx-newlib10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611513" version="1" comment="gcc10 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296082" version="1" comment="gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611514" version="1" comment="gcc10-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296083" version="1" comment="gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611515" version="1" comment="gcc10-ada is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296084" version="1" comment="gcc10-ada is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611516" version="1" comment="gcc10-ada-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296085" version="1" comment="gcc10-ada-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611517" version="1" comment="gcc10-c++ is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296086" version="1" comment="gcc10-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611518" version="1" comment="gcc10-c++-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296087" version="1" comment="gcc10-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611519" version="1" comment="gcc10-d is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296088" version="1" comment="gcc10-d is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611520" version="1" comment="gcc10-d-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296089" version="1" comment="gcc10-d-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611521" version="1" comment="gcc10-fortran is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296090" version="1" comment="gcc10-fortran is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611522" version="1" comment="gcc10-fortran-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296091" version="1" comment="gcc10-fortran-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611523" version="1" comment="gcc10-go is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296092" version="1" comment="gcc10-go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611524" version="1" comment="gcc10-go-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296093" version="1" comment="gcc10-go-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611525" version="1" comment="gcc10-info is &lt;10.2.1+git583-lp152.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296094" version="1" comment="gcc10-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611526" version="1" comment="gcc10-locale is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296095" version="1" comment="gcc10-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611527" version="1" comment="gcc10-obj-c++ is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296096" version="1" comment="gcc10-obj-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611528" version="1" comment="gcc10-obj-c++-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296097" version="1" comment="gcc10-obj-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611529" version="1" comment="gcc10-objc is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296098" version="1" comment="gcc10-objc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611530" version="1" comment="gcc10-objc-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296099" version="1" comment="gcc10-objc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612470" version="1" comment="gcc7 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268649" version="1" comment="gcc7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612471" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268650" version="1" comment="gcc7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612472" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268651" version="1" comment="gcc7-ada is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612473" version="1" comment="gcc7-ada-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268652" version="1" comment="gcc7-ada-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612474" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268653" version="1" comment="gcc7-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612475" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268654" version="1" comment="gcc7-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612476" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268655" version="1" comment="gcc7-fortran is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612477" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268656" version="1" comment="gcc7-fortran-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612478" version="1" comment="gcc7-go is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268657" version="1" comment="gcc7-go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612479" version="1" comment="gcc7-go-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268658" version="1" comment="gcc7-go-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612480" version="1" comment="gcc7-info is &lt;7.5.0+r278197-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268659" version="1" comment="gcc7-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612481" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268660" version="1" comment="gcc7-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612482" version="1" comment="gcc7-obj-c++ is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268661" version="1" comment="gcc7-obj-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612483" version="1" comment="gcc7-obj-c++-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268662" version="1" comment="gcc7-obj-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612484" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268663" version="1" comment="gcc7-objc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612485" version="1" comment="gcc7-objc-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268664" version="1" comment="gcc7-objc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611531" version="1" comment="libada10 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296100" version="1" comment="libada10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611532" version="1" comment="libada10-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296101" version="1" comment="libada10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612486" version="1" comment="libada7 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268665" version="1" comment="libada7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612487" version="1" comment="libada7-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268666" version="1" comment="libada7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612488" version="1" comment="libasan4 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268667" version="1" comment="libasan4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612489" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268668" version="1" comment="libasan4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611533" version="1" comment="libasan6 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296102" version="1" comment="libasan6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611534" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296103" version="1" comment="libasan6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611535" version="1" comment="libatomic1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152915" version="1" comment="libatomic1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611536" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152916" version="1" comment="libatomic1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612490" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152919" version="1" comment="libcilkrts5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612491" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152920" version="1" comment="libcilkrts5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611537" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152931" version="1" comment="libgcc_s1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611538" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152932" version="1" comment="libgcc_s1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611539" version="1" comment="libgdruntime1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296104" version="1" comment="libgdruntime1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611540" version="1" comment="libgdruntime1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296105" version="1" comment="libgdruntime1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612492" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268669" version="1" comment="libgfortran4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612493" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268670" version="1" comment="libgfortran4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611541" version="1" comment="libgfortran5 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283969" version="1" comment="libgfortran5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611542" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283970" version="1" comment="libgfortran5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612494" version="1" comment="libgo11 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268671" version="1" comment="libgo11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612495" version="1" comment="libgo11-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268672" version="1" comment="libgo11-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611543" version="1" comment="libgo16 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296106" version="1" comment="libgo16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611544" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296107" version="1" comment="libgo16-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611545" version="1" comment="libgomp1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152942" version="1" comment="libgomp1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611546" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152943" version="1" comment="libgomp1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611547" version="1" comment="libgphobos1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296108" version="1" comment="libgphobos1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611548" version="1" comment="libgphobos1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296109" version="1" comment="libgphobos1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611549" version="1" comment="libitm1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152946" version="1" comment="libitm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611550" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152947" version="1" comment="libitm1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611551" version="1" comment="liblsan0 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152950" version="1" comment="liblsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611552" version="1" comment="libobjc4 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152198" version="1" comment="libobjc4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611553" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152955" version="1" comment="libobjc4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611554" version="1" comment="libquadmath0 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152956" version="1" comment="libquadmath0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611555" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152957" version="1" comment="libquadmath0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611556" version="1" comment="libstdc++6 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152962" version="1" comment="libstdc++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611557" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152963" version="1" comment="libstdc++6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611558" version="1" comment="libstdc++6-devel-gcc10 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296110" version="1" comment="libstdc++6-devel-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611559" version="1" comment="libstdc++6-devel-gcc10-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296111" version="1" comment="libstdc++6-devel-gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612496" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268673" version="1" comment="libstdc++6-devel-gcc7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612497" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268674" version="1" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611560" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152968" version="1" comment="libstdc++6-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611561" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296112" version="1" comment="libstdc++6-pp-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611562" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296113" version="1" comment="libstdc++6-pp-gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611563" version="1" comment="libtsan0 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152969" version="1" comment="libtsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612498" version="1" comment="libubsan0 is &lt;7.5.0+r278197-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152971" version="1" comment="libubsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612499" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152972" version="1" comment="libubsan0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611564" version="1" comment="libubsan1 is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283977" version="1" comment="libubsan1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611565" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-lp152.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283978" version="1" comment="libubsan1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611566" version="1" comment="nvptx-tools is &lt;1.0-lp152.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296114" version="1" comment="nvptx-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609988" version="1" comment="singularity is &lt;3.6.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238040" version="1" comment="singularity is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610216" version="1" comment="python2-targetcli-fb is &lt;2.1.52-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288926" version="1" comment="python2-targetcli-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610217" version="1" comment="python3-targetcli-fb is &lt;2.1.52-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288927" version="1" comment="python3-targetcli-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610218" version="1" comment="targetcli-fb-common is &lt;2.1.52-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288929" version="1" comment="targetcli-fb-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610198" version="1" comment="tomcat is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610199" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610200" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610201" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610202" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610203" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610204" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610205" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610206" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610207" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610208" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613799" version="1" comment="velocity is &lt;1.7-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347970" version="1" comment="velocity is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613800" version="1" comment="velocity-demo is &lt;1.7-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347971" version="1" comment="velocity-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613801" version="1" comment="velocity-javadoc is &lt;1.7-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347972" version="1" comment="velocity-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613802" version="1" comment="velocity-manual is &lt;1.7-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347973" version="1" comment="velocity-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611797" version="1" comment="tomcat is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611798" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611799" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611800" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611801" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611802" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611803" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611804" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611805" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611806" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611807" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615158" version="1" comment="apache2 is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615159" version="1" comment="apache2-devel is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615160" version="1" comment="apache2-doc is &lt;2.4.43-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615161" version="1" comment="apache2-event is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615162" version="1" comment="apache2-example-pages is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615163" version="1" comment="apache2-prefork is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615164" version="1" comment="apache2-utils is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615165" version="1" comment="apache2-worker is &lt;2.4.43-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610859" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152268" version="1" comment="libQt5Bootstrap-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610860" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152269" version="1" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610861" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152274" version="1" comment="libQt5Concurrent-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610862" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152275" version="1" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610863" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152276" version="1" comment="libQt5Concurrent5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610864" version="1" comment="libQt5Concurrent5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152277" version="1" comment="libQt5Concurrent5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610865" version="1" comment="libQt5Core-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152278" version="1" comment="libQt5Core-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610866" version="1" comment="libQt5Core-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152279" version="1" comment="libQt5Core-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610867" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152280" version="1" comment="libQt5Core-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610868" version="1" comment="libQt5Core5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152281" version="1" comment="libQt5Core5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610869" version="1" comment="libQt5Core5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152282" version="1" comment="libQt5Core5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610870" version="1" comment="libQt5DBus-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152283" version="1" comment="libQt5DBus-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610871" version="1" comment="libQt5DBus-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152284" version="1" comment="libQt5DBus-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610872" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152285" version="1" comment="libQt5DBus-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610873" version="1" comment="libQt5DBus5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152286" version="1" comment="libQt5DBus5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610874" version="1" comment="libQt5DBus5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152287" version="1" comment="libQt5DBus5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610875" version="1" comment="libQt5Gui-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152294" version="1" comment="libQt5Gui-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610876" version="1" comment="libQt5Gui-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152295" version="1" comment="libQt5Gui-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610877" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152296" version="1" comment="libQt5Gui-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610878" version="1" comment="libQt5Gui5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152297" version="1" comment="libQt5Gui5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610879" version="1" comment="libQt5Gui5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152298" version="1" comment="libQt5Gui5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610880" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245302" version="1" comment="libQt5KmsSupport-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610881" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245303" version="1" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610882" version="1" comment="libQt5Network-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152305" version="1" comment="libQt5Network-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610883" version="1" comment="libQt5Network-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152306" version="1" comment="libQt5Network-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610884" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152307" version="1" comment="libQt5Network-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610885" version="1" comment="libQt5Network5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152308" version="1" comment="libQt5Network5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610886" version="1" comment="libQt5Network5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152309" version="1" comment="libQt5Network5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610887" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152313" version="1" comment="libQt5OpenGL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610888" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152314" version="1" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610889" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152315" version="1" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610890" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152316" version="1" comment="libQt5OpenGL5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610891" version="1" comment="libQt5OpenGL5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152317" version="1" comment="libQt5OpenGL5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610892" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152318" version="1" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610893" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152319" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610894" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152320" version="1" comment="libQt5PlatformHeaders-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610895" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152321" version="1" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610896" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152322" version="1" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610897" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152323" version="1" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610898" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152326" version="1" comment="libQt5PrintSupport-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610899" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152327" version="1" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610900" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152328" version="1" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610901" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152329" version="1" comment="libQt5PrintSupport5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610902" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152330" version="1" comment="libQt5PrintSupport5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610903" version="1" comment="libQt5Sql-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152338" version="1" comment="libQt5Sql-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610904" version="1" comment="libQt5Sql-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152339" version="1" comment="libQt5Sql-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610905" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152340" version="1" comment="libQt5Sql-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610906" version="1" comment="libQt5Sql5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152341" version="1" comment="libQt5Sql5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610907" version="1" comment="libQt5Sql5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152342" version="1" comment="libQt5Sql5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610908" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152343" version="1" comment="libQt5Sql5-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610909" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152344" version="1" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610910" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152345" version="1" comment="libQt5Sql5-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610911" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152346" version="1" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610912" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152347" version="1" comment="libQt5Sql5-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610913" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152348" version="1" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610914" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152349" version="1" comment="libQt5Sql5-unixODBC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610915" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152350" version="1" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610916" version="1" comment="libQt5Test-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152353" version="1" comment="libQt5Test-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610917" version="1" comment="libQt5Test-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152354" version="1" comment="libQt5Test-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610918" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152355" version="1" comment="libQt5Test-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610919" version="1" comment="libQt5Test5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152356" version="1" comment="libQt5Test5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610920" version="1" comment="libQt5Test5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152357" version="1" comment="libQt5Test5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610921" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152377" version="1" comment="libQt5Widgets-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610922" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152378" version="1" comment="libQt5Widgets-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610923" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152379" version="1" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610924" version="1" comment="libQt5Widgets5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152380" version="1" comment="libQt5Widgets5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610925" version="1" comment="libQt5Widgets5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152381" version="1" comment="libQt5Widgets5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610926" version="1" comment="libQt5Xml-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152384" version="1" comment="libQt5Xml-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610927" version="1" comment="libQt5Xml-devel-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152385" version="1" comment="libQt5Xml-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610928" version="1" comment="libQt5Xml5 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152386" version="1" comment="libQt5Xml5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610929" version="1" comment="libQt5Xml5-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152387" version="1" comment="libQt5Xml5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610930" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152401" version="1" comment="libqt5-qtbase-common-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610931" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152402" version="1" comment="libqt5-qtbase-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610932" version="1" comment="libqt5-qtbase-examples is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152404" version="1" comment="libqt5-qtbase-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610933" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.12.7-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152405" version="1" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610934" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177209" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610935" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.12.7-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291866" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610936" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152407" version="1" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615277" version="1" comment="iscsiuio is &lt;0.7.8.6-lp152.18.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474403" version="1" comment="iscsiuio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615278" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.4-lp152.18.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474405" version="1" comment="libopeniscsiusr0_2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615279" version="1" comment="open-iscsi is &lt;2.1.4-lp152.18.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474407" version="1" comment="open-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615280" version="1" comment="open-iscsi-devel is &lt;2.1.4-lp152.18.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474409" version="1" comment="open-iscsi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615281" version="1" comment="icinga2 is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297975" version="1" comment="icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615282" version="1" comment="icinga2-bin is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297977" version="1" comment="icinga2-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615283" version="1" comment="icinga2-common is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297979" version="1" comment="icinga2-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615284" version="1" comment="icinga2-doc is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297981" version="1" comment="icinga2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615285" version="1" comment="icinga2-ido-mysql is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297983" version="1" comment="icinga2-ido-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615286" version="1" comment="icinga2-ido-pgsql is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297985" version="1" comment="icinga2-ido-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615287" version="1" comment="nano-icinga2 is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297987" version="1" comment="nano-icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615288" version="1" comment="vim-icinga2 is &lt;2.12.1-lp152.3.3.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297989" version="1" comment="vim-icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610230" version="1" comment="python2-rtslib-fb is &lt;2.1.73-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291446" version="1" comment="python2-rtslib-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610231" version="1" comment="python3-rtslib-fb is &lt;2.1.73-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291447" version="1" comment="python3-rtslib-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610161" version="1" comment="go1.13 is &lt;1.13.14-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287972" version="1" comment="go1.13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610162" version="1" comment="go1.13-doc is &lt;1.13.14-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287973" version="1" comment="go1.13-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610163" version="1" comment="go1.13-race is &lt;1.13.14-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287974" version="1" comment="go1.13-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611053" version="1" comment="go1.14 is &lt;1.14.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281967" version="1" comment="go1.14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611054" version="1" comment="go1.14-doc is &lt;1.14.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281968" version="1" comment="go1.14-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611055" version="1" comment="go1.14-race is &lt;1.14.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281969" version="1" comment="go1.14-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612713" version="1" comment="squid is &lt;4.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152563" version="1" comment="squid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612714" version="1" comment="mutt is &lt;1.10.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152082" version="1" comment="mutt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612715" version="1" comment="mutt-doc is &lt;1.10.1-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161283" version="1" comment="mutt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612716" version="1" comment="mutt-lang is &lt;1.10.1-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161284" version="1" comment="mutt-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606518" version="1" comment="neomutt is &lt;20201120-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302848" version="1" comment="neomutt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606519" version="1" comment="neomutt-doc is &lt;20201120-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302850" version="1" comment="neomutt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606520" version="1" comment="neomutt-lang is &lt;20201120-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302852" version="1" comment="neomutt-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612448" version="1" comment="openssh is &lt;8.1p1-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612449" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153167" version="1" comment="openssh-askpass-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612450" version="1" comment="openssh-cavs is &lt;8.1p1-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153168" version="1" comment="openssh-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612451" version="1" comment="openssh-fips is &lt;8.1p1-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153169" version="1" comment="openssh-fips is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612452" version="1" comment="openssh-helpers is &lt;8.1p1-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152111" version="1" comment="openssh-helpers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615289" version="1" comment="pdns-recursor is &lt;4.3.5-lp152.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153799" version="1" comment="pdns-recursor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653859" version="1" comment="dnsmasq is &lt;2.86-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152784" version="1" comment="dnsmasq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653860" version="1" comment="dnsmasq-utils is &lt;2.86-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153255" version="1" comment="dnsmasq-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611019" version="1" comment="kernel-debug is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611020" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611021" version="1" comment="kernel-default is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611022" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.41.1.lp152.8.6.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611023" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.41.1.lp152.8.6.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611024" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611025" version="1" comment="kernel-devel is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611026" version="1" comment="kernel-docs is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611027" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611028" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611029" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611030" version="1" comment="kernel-macros is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611031" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611032" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611033" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611034" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611035" version="1" comment="kernel-source is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611036" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611037" version="1" comment="kernel-syms is &lt;5.3.18-lp152.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611845" version="1" comment="ctdb is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611846" version="1" comment="ctdb-pcp-pmda is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611847" version="1" comment="ctdb-tests is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611848" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611849" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611850" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611851" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611852" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611853" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611854" version="1" comment="libdcerpc0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611855" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611856" version="1" comment="libndr-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611857" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611858" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611859" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611860" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611861" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611862" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611863" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611864" version="1" comment="libndr-standard0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611865" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611866" version="1" comment="libndr0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611867" version="1" comment="libndr0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611868" version="1" comment="libnetapi-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611869" version="1" comment="libnetapi-devel-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611870" version="1" comment="libnetapi0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611871" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611872" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611873" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611874" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611875" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611876" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611877" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611878" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611879" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611880" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611881" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611882" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611883" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611884" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611885" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611886" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611887" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611888" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611889" version="1" comment="libsamba-util0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611890" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611891" version="1" comment="libsamdb-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611892" version="1" comment="libsamdb0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611893" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611894" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611895" version="1" comment="libsmbclient0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611896" version="1" comment="libsmbclient0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611897" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611898" version="1" comment="libsmbconf0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611899" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611900" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611901" version="1" comment="libsmbldap2 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611902" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611903" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611904" version="1" comment="libtevent-util0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611905" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611906" version="1" comment="libwbclient-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611907" version="1" comment="libwbclient0 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611908" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611909" version="1" comment="samba is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611910" version="1" comment="samba-ad-dc is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611911" version="1" comment="samba-ad-dc-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611912" version="1" comment="samba-ceph is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611913" version="1" comment="samba-client is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611914" version="1" comment="samba-client-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611915" version="1" comment="samba-core-devel is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611916" version="1" comment="samba-doc is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611917" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611918" version="1" comment="samba-libs is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611919" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611920" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611921" version="1" comment="samba-libs-python3-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611922" version="1" comment="samba-python3 is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611923" version="1" comment="samba-test is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611924" version="1" comment="samba-winbind is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611925" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.202.344b137b75d-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611058" version="1" comment="libvirt is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151423" version="1" comment="libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611059" version="1" comment="libvirt-admin is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166268" version="1" comment="libvirt-admin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611060" version="1" comment="libvirt-bash-completion is &lt;6.0.0-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266806" version="1" comment="libvirt-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611061" version="1" comment="libvirt-client is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611062" version="1" comment="libvirt-daemon is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611063" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151426" version="1" comment="libvirt-daemon-config-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611064" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151427" version="1" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611065" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151428" version="1" comment="libvirt-daemon-driver-interface is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611066" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151429" version="1" comment="libvirt-daemon-driver-libxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611067" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151430" version="1" comment="libvirt-daemon-driver-lxc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611068" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611069" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611070" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611071" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611072" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611073" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611074" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161274" version="1" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611075" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161275" version="1" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611076" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266807" version="1" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611077" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161276" version="1" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611078" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161277" version="1" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611079" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161278" version="1" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611080" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161279" version="1" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611081" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161280" version="1" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611082" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170836" version="1" comment="libvirt-daemon-hooks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611083" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151439" version="1" comment="libvirt-daemon-lxc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611084" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611085" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151441" version="1" comment="libvirt-daemon-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611086" version="1" comment="libvirt-devel is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152991" version="1" comment="libvirt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611087" version="1" comment="libvirt-devel-32bit is &lt;6.0.0-lp152.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152992" version="1" comment="libvirt-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611088" version="1" comment="libvirt-doc is &lt;6.0.0-lp152.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152993" version="1" comment="libvirt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611089" version="1" comment="libvirt-libs is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161281" version="1" comment="libvirt-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611090" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152994" version="1" comment="libvirt-lock-sanlock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611091" version="1" comment="libvirt-nss is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166269" version="1" comment="libvirt-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611092" version="1" comment="wireshark-plugin-libvirt is &lt;6.0.0-lp152.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223340" version="1" comment="wireshark-plugin-libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614463" version="1" comment="cifs-utils is &lt;6.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151261" version="1" comment="cifs-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614464" version="1" comment="cifs-utils-devel is &lt;6.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294754" version="1" comment="cifs-utils-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614465" version="1" comment="pam_cifscreds is &lt;6.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294755" version="1" comment="pam_cifscreds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615302" version="1" comment="python2-PyYAML is &lt;5.3.1-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281491" version="1" comment="python2-PyYAML is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615514" version="1" comment="python3-PyYAML is &lt;5.3.1-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281492" version="1" comment="python3-PyYAML is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610303" version="1" comment="libX11-6 is &lt;1.6.5-lp152.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610304" version="1" comment="libX11-6-32bit is &lt;1.6.5-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151818" version="1" comment="libX11-6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610305" version="1" comment="libX11-data is &lt;1.6.5-lp152.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610306" version="1" comment="libX11-devel is &lt;1.6.5-lp152.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151820" version="1" comment="libX11-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610307" version="1" comment="libX11-devel-32bit is &lt;1.6.5-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153719" version="1" comment="libX11-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610308" version="1" comment="libX11-xcb1 is &lt;1.6.5-lp152.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610309" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151822" version="1" comment="libX11-xcb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610239" version="1" comment="libxcb-composite0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151866" version="1" comment="libxcb-composite0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610240" version="1" comment="libxcb-composite0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153818" version="1" comment="libxcb-composite0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610241" version="1" comment="libxcb-damage0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151867" version="1" comment="libxcb-damage0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610242" version="1" comment="libxcb-damage0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153819" version="1" comment="libxcb-damage0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610243" version="1" comment="libxcb-devel is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151868" version="1" comment="libxcb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610244" version="1" comment="libxcb-devel-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153820" version="1" comment="libxcb-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610245" version="1" comment="libxcb-devel-doc is &lt;1.13-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153821" version="1" comment="libxcb-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610246" version="1" comment="libxcb-dpms0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151869" version="1" comment="libxcb-dpms0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610247" version="1" comment="libxcb-dpms0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153822" version="1" comment="libxcb-dpms0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610248" version="1" comment="libxcb-dri2-0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151870" version="1" comment="libxcb-dri2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610249" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151871" version="1" comment="libxcb-dri2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610250" version="1" comment="libxcb-dri3-0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151872" version="1" comment="libxcb-dri3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610251" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151873" version="1" comment="libxcb-dri3-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610252" version="1" comment="libxcb-glx0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151874" version="1" comment="libxcb-glx0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610253" version="1" comment="libxcb-glx0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151875" version="1" comment="libxcb-glx0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610254" version="1" comment="libxcb-present0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151876" version="1" comment="libxcb-present0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610255" version="1" comment="libxcb-present0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151877" version="1" comment="libxcb-present0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610256" version="1" comment="libxcb-randr0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151878" version="1" comment="libxcb-randr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610257" version="1" comment="libxcb-randr0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153823" version="1" comment="libxcb-randr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610258" version="1" comment="libxcb-record0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151879" version="1" comment="libxcb-record0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610259" version="1" comment="libxcb-record0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153824" version="1" comment="libxcb-record0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610260" version="1" comment="libxcb-render0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151880" version="1" comment="libxcb-render0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610261" version="1" comment="libxcb-render0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151881" version="1" comment="libxcb-render0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610262" version="1" comment="libxcb-res0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151882" version="1" comment="libxcb-res0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610263" version="1" comment="libxcb-res0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153825" version="1" comment="libxcb-res0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610264" version="1" comment="libxcb-screensaver0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151883" version="1" comment="libxcb-screensaver0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610265" version="1" comment="libxcb-screensaver0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153826" version="1" comment="libxcb-screensaver0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610266" version="1" comment="libxcb-shape0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151884" version="1" comment="libxcb-shape0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610267" version="1" comment="libxcb-shape0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153827" version="1" comment="libxcb-shape0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610268" version="1" comment="libxcb-shm0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151885" version="1" comment="libxcb-shm0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610269" version="1" comment="libxcb-shm0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151886" version="1" comment="libxcb-shm0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610270" version="1" comment="libxcb-sync1 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151887" version="1" comment="libxcb-sync1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610271" version="1" comment="libxcb-sync1-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151888" version="1" comment="libxcb-sync1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610272" version="1" comment="libxcb-xf86dri0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151890" version="1" comment="libxcb-xf86dri0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610273" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153829" version="1" comment="libxcb-xf86dri0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610274" version="1" comment="libxcb-xfixes0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151891" version="1" comment="libxcb-xfixes0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610275" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151892" version="1" comment="libxcb-xfixes0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610276" version="1" comment="libxcb-xinerama0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151893" version="1" comment="libxcb-xinerama0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610277" version="1" comment="libxcb-xinerama0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153830" version="1" comment="libxcb-xinerama0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610278" version="1" comment="libxcb-xinput0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177183" version="1" comment="libxcb-xinput0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610279" version="1" comment="libxcb-xinput0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289014" version="1" comment="libxcb-xinput0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610280" version="1" comment="libxcb-xkb1 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151894" version="1" comment="libxcb-xkb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610281" version="1" comment="libxcb-xkb1-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153831" version="1" comment="libxcb-xkb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610282" version="1" comment="libxcb-xtest0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151896" version="1" comment="libxcb-xtest0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610283" version="1" comment="libxcb-xtest0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153833" version="1" comment="libxcb-xtest0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610284" version="1" comment="libxcb-xv0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151897" version="1" comment="libxcb-xv0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610285" version="1" comment="libxcb-xv0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153834" version="1" comment="libxcb-xv0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610286" version="1" comment="libxcb-xvmc0 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151898" version="1" comment="libxcb-xvmc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610287" version="1" comment="libxcb-xvmc0-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153835" version="1" comment="libxcb-xvmc0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610288" version="1" comment="libxcb1 is &lt;1.13-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151899" version="1" comment="libxcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610289" version="1" comment="libxcb1-32bit is &lt;1.13-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151900" version="1" comment="libxcb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610747" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151420" version="1" comment="xorg-x11-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610748" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151421" version="1" comment="xorg-x11-server-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610749" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151422" version="1" comment="xorg-x11-server-sdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610750" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157107" version="1" comment="xorg-x11-server-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610751" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177168" version="1" comment="xorg-x11-server-wayland is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610502" version="1" comment="libecpg6 is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151069" version="1" comment="libecpg6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610503" version="1" comment="libecpg6-32bit is &lt;12.4-lp152.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151070" version="1" comment="libecpg6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610504" version="1" comment="libpq5 is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151071" version="1" comment="libpq5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610505" version="1" comment="libpq5-32bit is &lt;12.4-lp152.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151072" version="1" comment="libpq5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610368" version="1" comment="postgresql is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177236" version="1" comment="postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610369" version="1" comment="postgresql-contrib is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289717" version="1" comment="postgresql-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610370" version="1" comment="postgresql-devel is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289718" version="1" comment="postgresql-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610371" version="1" comment="postgresql-docs is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289719" version="1" comment="postgresql-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610372" version="1" comment="postgresql-llvmjit is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289720" version="1" comment="postgresql-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610373" version="1" comment="postgresql-plperl is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289721" version="1" comment="postgresql-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610374" version="1" comment="postgresql-plpython is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289722" version="1" comment="postgresql-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610375" version="1" comment="postgresql-pltcl is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289723" version="1" comment="postgresql-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610376" version="1" comment="postgresql-server is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177237" version="1" comment="postgresql-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610377" version="1" comment="postgresql-server-devel is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289724" version="1" comment="postgresql-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610378" version="1" comment="postgresql-test is &lt;12.0.1-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289725" version="1" comment="postgresql-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610938" version="1" comment="postgresql10 is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177238" version="1" comment="postgresql10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610939" version="1" comment="postgresql10-contrib is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233996" version="1" comment="postgresql10-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610940" version="1" comment="postgresql10-devel is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233997" version="1" comment="postgresql10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610941" version="1" comment="postgresql10-docs is &lt;10.14-lp152.2.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233998" version="1" comment="postgresql10-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610942" version="1" comment="postgresql10-plperl is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233999" version="1" comment="postgresql10-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610943" version="1" comment="postgresql10-plpython is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234000" version="1" comment="postgresql10-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610944" version="1" comment="postgresql10-pltcl is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234001" version="1" comment="postgresql10-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610945" version="1" comment="postgresql10-server is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177239" version="1" comment="postgresql10-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610946" version="1" comment="postgresql10-test is &lt;10.14-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234002" version="1" comment="postgresql10-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610388" version="1" comment="postgresql11 is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291449" version="1" comment="postgresql11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610389" version="1" comment="postgresql11-contrib is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291450" version="1" comment="postgresql11-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610390" version="1" comment="postgresql11-devel is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291451" version="1" comment="postgresql11-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610391" version="1" comment="postgresql11-docs is &lt;11.9-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291452" version="1" comment="postgresql11-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610392" version="1" comment="postgresql11-llvmjit is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291453" version="1" comment="postgresql11-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610393" version="1" comment="postgresql11-plperl is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291454" version="1" comment="postgresql11-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610394" version="1" comment="postgresql11-plpython is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291455" version="1" comment="postgresql11-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610395" version="1" comment="postgresql11-pltcl is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291456" version="1" comment="postgresql11-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610396" version="1" comment="postgresql11-server is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291457" version="1" comment="postgresql11-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610397" version="1" comment="postgresql11-server-devel is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291458" version="1" comment="postgresql11-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610398" version="1" comment="postgresql11-test is &lt;11.9-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291459" version="1" comment="postgresql11-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610506" version="1" comment="postgresql12 is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289726" version="1" comment="postgresql12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610507" version="1" comment="postgresql12-contrib is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289727" version="1" comment="postgresql12-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610508" version="1" comment="postgresql12-devel is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289728" version="1" comment="postgresql12-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610509" version="1" comment="postgresql12-docs is &lt;12.4-lp152.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289729" version="1" comment="postgresql12-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610510" version="1" comment="postgresql12-llvmjit is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289730" version="1" comment="postgresql12-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610511" version="1" comment="postgresql12-plperl is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289731" version="1" comment="postgresql12-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610512" version="1" comment="postgresql12-plpython is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289732" version="1" comment="postgresql12-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610513" version="1" comment="postgresql12-pltcl is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289733" version="1" comment="postgresql12-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610514" version="1" comment="postgresql12-server is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289734" version="1" comment="postgresql12-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610515" version="1" comment="postgresql12-server-devel is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289735" version="1" comment="postgresql12-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610516" version="1" comment="postgresql12-test is &lt;12.4-lp152.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289736" version="1" comment="postgresql12-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610410" version="1" comment="postgresql96 is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161265" version="1" comment="postgresql96 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610411" version="1" comment="postgresql96-contrib is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161266" version="1" comment="postgresql96-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610412" version="1" comment="postgresql96-devel is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161267" version="1" comment="postgresql96-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610413" version="1" comment="postgresql96-docs is &lt;9.6.19-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161268" version="1" comment="postgresql96-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610414" version="1" comment="postgresql96-plperl is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163501" version="1" comment="postgresql96-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610415" version="1" comment="postgresql96-plpython is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163503" version="1" comment="postgresql96-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610416" version="1" comment="postgresql96-pltcl is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163505" version="1" comment="postgresql96-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610417" version="1" comment="postgresql96-server is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161269" version="1" comment="postgresql96-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610418" version="1" comment="postgresql96-test is &lt;9.6.19-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163508" version="1" comment="postgresql96-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611991" version="1" comment="kernel-debug is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611992" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611993" version="1" comment="kernel-default is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611994" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611995" version="1" comment="kernel-devel is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611996" version="1" comment="kernel-docs is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611997" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611998" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611999" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612000" version="1" comment="kernel-macros is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612001" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612002" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612003" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612004" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612005" version="1" comment="kernel-source is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612006" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612007" version="1" comment="kernel-syms is &lt;5.3.18-lp152.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613136" version="1" comment="librepo-devel is &lt;1.12.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291461" version="1" comment="librepo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613137" version="1" comment="librepo0 is &lt;1.12.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291462" version="1" comment="librepo0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613138" version="1" comment="python3-librepo is &lt;1.12.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291463" version="1" comment="python3-librepo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611810" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151753" version="1" comment="libspice-client-glib-2_0-8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611811" version="1" comment="libspice-client-glib-helper is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154105" version="1" comment="libspice-client-glib-helper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611812" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161282" version="1" comment="libspice-client-gtk-3_0-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611808" version="1" comment="libspice-server-devel is &lt;0.14.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153281" version="1" comment="libspice-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611809" version="1" comment="libspice-server1 is &lt;0.14.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151923" version="1" comment="libspice-server1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611813" version="1" comment="spice-gtk is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174258" version="1" comment="spice-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611814" version="1" comment="spice-gtk-devel is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174259" version="1" comment="spice-gtk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611815" version="1" comment="spice-gtk-lang is &lt;0.37-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174260" version="1" comment="spice-gtk-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611816" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151758" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611817" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.37-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151759" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612337" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612338" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612339" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612340" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612341" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611014" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611015" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611016" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611017" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611018" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611007" version="1" comment="libX11-6 is &lt;1.6.5-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611008" version="1" comment="libX11-6-32bit is &lt;1.6.5-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611009" version="1" comment="libX11-data is &lt;1.6.5-lp152.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611010" version="1" comment="libX11-devel is &lt;1.6.5-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611011" version="1" comment="libX11-devel-32bit is &lt;1.6.5-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611012" version="1" comment="libX11-xcb1 is &lt;1.6.5-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611013" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612168" version="1" comment="podman is &lt;2.1.1-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612169" version="1" comment="podman-cni-config is &lt;2.1.1-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613810" version="1" comment="grub2 is &lt;2.04-lp152.7.22.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613811" version="1" comment="grub2-branding-upstream is &lt;2.04-lp152.7.22.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613812" version="1" comment="grub2-i386-efi is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613813" version="1" comment="grub2-i386-efi-debug is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613814" version="1" comment="grub2-i386-pc is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613815" version="1" comment="grub2-i386-pc-debug is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613816" version="1" comment="grub2-i386-xen is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613817" version="1" comment="grub2-snapper-plugin is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613818" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613819" version="1" comment="grub2-x86_64-efi is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613820" version="1" comment="grub2-x86_64-efi-debug is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613821" version="1" comment="grub2-x86_64-xen is &lt;2.04-lp152.7.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611427" version="1" comment="dpdk is &lt;19.11.4-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611428" version="1" comment="dpdk-devel is &lt;19.11.4-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611429" version="1" comment="dpdk-doc is &lt;19.11.4-lp152.2.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611430" version="1" comment="dpdk-examples is &lt;19.11.4-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611431" version="1" comment="dpdk-kmp-default is &lt;19.11.4_k5.3.18_lp152.41-lp152.2.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611432" version="1" comment="dpdk-kmp-preempt is &lt;19.11.4_k5.3.18_lp152.41-lp152.2.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611433" version="1" comment="dpdk-tools is &lt;19.11.4-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611434" version="1" comment="libdpdk-20_0 is &lt;19.11.4-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611152" version="1" comment="perl-DBI is &lt;1.642-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609985" version="1" comment="python-ipaddress is &lt;1.0.18-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287509" version="1" comment="python-ipaddress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631862" version="1" comment="cacti is &lt;1.2.18-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631863" version="1" comment="cacti-spine is &lt;1.2.18-lp152.2.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610335" version="1" comment="java-11-openjdk is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231592" version="1" comment="java-11-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610336" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231593" version="1" comment="java-11-openjdk-accessibility is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610337" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231594" version="1" comment="java-11-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610338" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231595" version="1" comment="java-11-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610339" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231596" version="1" comment="java-11-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610340" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231597" version="1" comment="java-11-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610341" version="1" comment="java-11-openjdk-jmods is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231598" version="1" comment="java-11-openjdk-jmods is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610342" version="1" comment="java-11-openjdk-src is &lt;11.0.8.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231599" version="1" comment="java-11-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611983" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298898" version="1" comment="java-1_8_0-openj9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611984" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298899" version="1" comment="java-1_8_0-openj9-accessibility is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611985" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298900" version="1" comment="java-1_8_0-openj9-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611986" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298901" version="1" comment="java-1_8_0-openj9-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611987" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298902" version="1" comment="java-1_8_0-openj9-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611988" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.272-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298903" version="1" comment="java-1_8_0-openj9-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611989" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.272-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298904" version="1" comment="java-1_8_0-openj9-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612223" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152674" version="1" comment="java-1_8_0-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612224" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152835" version="1" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612225" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152836" version="1" comment="java-1_8_0-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612226" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152675" version="1" comment="java-1_8_0-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612227" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152676" version="1" comment="java-1_8_0-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612228" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.272-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152837" version="1" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612229" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.272-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152838" version="1" comment="java-1_8_0-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611153" version="1" comment="python3-virtualbox is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611154" version="1" comment="virtualbox is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611155" version="1" comment="virtualbox-devel is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611156" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.14-lp152.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611157" version="1" comment="virtualbox-guest-source is &lt;6.1.14-lp152.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611158" version="1" comment="virtualbox-guest-tools is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611159" version="1" comment="virtualbox-guest-x11 is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611160" version="1" comment="virtualbox-host-source is &lt;6.1.14-lp152.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611161" version="1" comment="virtualbox-kmp-default is &lt;6.1.14_k5.3.18_lp152.41-lp152.2.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611162" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.14_k5.3.18_lp152.41-lp152.2.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611163" version="1" comment="virtualbox-qt is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611164" version="1" comment="virtualbox-vnc is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611165" version="1" comment="virtualbox-websrv is &lt;6.1.14-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611202" version="1" comment="ctdb is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611203" version="1" comment="ctdb-pcp-pmda is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611204" version="1" comment="ctdb-tests is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611205" version="1" comment="libdcerpc-binding0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611206" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611207" version="1" comment="libdcerpc-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611208" version="1" comment="libdcerpc-samr-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611209" version="1" comment="libdcerpc-samr0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611210" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611211" version="1" comment="libdcerpc0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611212" version="1" comment="libdcerpc0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611213" version="1" comment="libndr-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611214" version="1" comment="libndr-krb5pac-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611215" version="1" comment="libndr-krb5pac0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611216" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611217" version="1" comment="libndr-nbt-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611218" version="1" comment="libndr-nbt0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611219" version="1" comment="libndr-nbt0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611220" version="1" comment="libndr-standard-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611221" version="1" comment="libndr-standard0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611222" version="1" comment="libndr-standard0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611223" version="1" comment="libndr0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611224" version="1" comment="libndr0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611225" version="1" comment="libnetapi-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611226" version="1" comment="libnetapi-devel-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611227" version="1" comment="libnetapi0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611228" version="1" comment="libnetapi0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611229" version="1" comment="libsamba-credentials-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611230" version="1" comment="libsamba-credentials0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611231" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611232" version="1" comment="libsamba-errors-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611233" version="1" comment="libsamba-errors0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611234" version="1" comment="libsamba-errors0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611235" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611236" version="1" comment="libsamba-hostconfig0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611237" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611238" version="1" comment="libsamba-passdb-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611239" version="1" comment="libsamba-passdb0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611240" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611241" version="1" comment="libsamba-policy-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611242" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611243" version="1" comment="libsamba-policy0-python3 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611244" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611245" version="1" comment="libsamba-util-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611246" version="1" comment="libsamba-util0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611247" version="1" comment="libsamba-util0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611248" version="1" comment="libsamdb-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611249" version="1" comment="libsamdb0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611250" version="1" comment="libsamdb0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611251" version="1" comment="libsmbclient-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611252" version="1" comment="libsmbclient0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611253" version="1" comment="libsmbclient0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611254" version="1" comment="libsmbconf-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611255" version="1" comment="libsmbconf0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611256" version="1" comment="libsmbconf0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611257" version="1" comment="libsmbldap-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611258" version="1" comment="libsmbldap2 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611259" version="1" comment="libsmbldap2-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611260" version="1" comment="libtevent-util-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611261" version="1" comment="libtevent-util0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611262" version="1" comment="libtevent-util0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611263" version="1" comment="libwbclient-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611264" version="1" comment="libwbclient0 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611265" version="1" comment="libwbclient0-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611266" version="1" comment="samba is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611267" version="1" comment="samba-ad-dc is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611268" version="1" comment="samba-ad-dc-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611269" version="1" comment="samba-ceph is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611270" version="1" comment="samba-client is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611271" version="1" comment="samba-client-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611272" version="1" comment="samba-core-devel is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611273" version="1" comment="samba-doc is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611274" version="1" comment="samba-dsdb-modules is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611275" version="1" comment="samba-libs is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611276" version="1" comment="samba-libs-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611277" version="1" comment="samba-libs-python3 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611278" version="1" comment="samba-libs-python3-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611279" version="1" comment="samba-python3 is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611280" version="1" comment="samba-test is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611281" version="1" comment="samba-winbind is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611282" version="1" comment="samba-winbind-32bit is &lt;4.11.13+git.189.e9bd318cd13-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612230" version="1" comment="libmariadb-devel is &lt;3.1.11-lp152.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261765" version="1" comment="libmariadb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612231" version="1" comment="libmariadb3 is &lt;3.1.11-lp152.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261766" version="1" comment="libmariadb3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612232" version="1" comment="libmariadb3-32bit is &lt;3.1.11-lp152.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261767" version="1" comment="libmariadb3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612233" version="1" comment="libmariadb_plugins is &lt;3.1.11-lp152.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261768" version="1" comment="libmariadb_plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612453" version="1" comment="libmariadbd-devel is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338686" version="1" comment="libmariadbd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612454" version="1" comment="libmariadbd19 is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338687" version="1" comment="libmariadbd19 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612234" version="1" comment="libmariadbprivate is &lt;3.1.11-lp152.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261769" version="1" comment="libmariadbprivate is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612455" version="1" comment="mariadb is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151099" version="1" comment="mariadb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612456" version="1" comment="mariadb-bench is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152841" version="1" comment="mariadb-bench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612457" version="1" comment="mariadb-client is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151100" version="1" comment="mariadb-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612458" version="1" comment="mariadb-errormessages is &lt;10.4.17-lp152.2.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151101" version="1" comment="mariadb-errormessages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612459" version="1" comment="mariadb-galera is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178284" version="1" comment="mariadb-galera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612460" version="1" comment="mariadb-rpm-macros is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338688" version="1" comment="mariadb-rpm-macros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612461" version="1" comment="mariadb-test is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152842" version="1" comment="mariadb-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612462" version="1" comment="mariadb-tools is &lt;10.4.17-lp152.2.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152843" version="1" comment="mariadb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612075" version="1" comment="java-11-openjdk is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612076" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612077" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612078" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612079" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612080" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.0-lp152.2.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612081" version="1" comment="java-11-openjdk-jmods is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612082" version="1" comment="java-11-openjdk-src is &lt;11.0.9.0-lp152.2.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613516" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613517" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613518" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613519" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613520" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613521" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.282-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613522" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.282-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613876" version="1" comment="evolution-data-server is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348193" version="1" comment="evolution-data-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613877" version="1" comment="evolution-data-server-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348194" version="1" comment="evolution-data-server-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613878" version="1" comment="evolution-data-server-devel is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348195" version="1" comment="evolution-data-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613879" version="1" comment="evolution-data-server-lang is &lt;3.34.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348196" version="1" comment="evolution-data-server-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613880" version="1" comment="evolution-ews is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348197" version="1" comment="evolution-ews is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613881" version="1" comment="evolution-ews-lang is &lt;3.34.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348198" version="1" comment="evolution-ews-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613882" version="1" comment="libcamel-1_2-62 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348199" version="1" comment="libcamel-1_2-62 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613883" version="1" comment="libcamel-1_2-62-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348200" version="1" comment="libcamel-1_2-62-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613884" version="1" comment="libebackend-1_2-10 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348201" version="1" comment="libebackend-1_2-10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613885" version="1" comment="libebackend-1_2-10-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348202" version="1" comment="libebackend-1_2-10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613886" version="1" comment="libebook-1_2-20 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348203" version="1" comment="libebook-1_2-20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613887" version="1" comment="libebook-1_2-20-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348204" version="1" comment="libebook-1_2-20-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613888" version="1" comment="libebook-contacts-1_2-3 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348205" version="1" comment="libebook-contacts-1_2-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613889" version="1" comment="libebook-contacts-1_2-3-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348206" version="1" comment="libebook-contacts-1_2-3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613890" version="1" comment="libecal-2_0-1 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348207" version="1" comment="libecal-2_0-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613891" version="1" comment="libecal-2_0-1-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348208" version="1" comment="libecal-2_0-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613892" version="1" comment="libedata-book-1_2-26 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348209" version="1" comment="libedata-book-1_2-26 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613893" version="1" comment="libedata-book-1_2-26-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348210" version="1" comment="libedata-book-1_2-26-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613894" version="1" comment="libedata-cal-2_0-1 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348211" version="1" comment="libedata-cal-2_0-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613895" version="1" comment="libedata-cal-2_0-1-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348212" version="1" comment="libedata-cal-2_0-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613896" version="1" comment="libedataserver-1_2-24 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348213" version="1" comment="libedataserver-1_2-24 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613897" version="1" comment="libedataserver-1_2-24-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348214" version="1" comment="libedataserver-1_2-24-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613898" version="1" comment="libedataserverui-1_2-2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348215" version="1" comment="libedataserverui-1_2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613899" version="1" comment="libedataserverui-1_2-2-32bit is &lt;3.34.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348216" version="1" comment="libedataserverui-1_2-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613900" version="1" comment="typelib-1_0-Camel-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348217" version="1" comment="typelib-1_0-Camel-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613901" version="1" comment="typelib-1_0-EBackend-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348218" version="1" comment="typelib-1_0-EBackend-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613902" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348219" version="1" comment="typelib-1_0-EBook-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613903" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348220" version="1" comment="typelib-1_0-EBookContacts-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613904" version="1" comment="typelib-1_0-ECal-2_0 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348221" version="1" comment="typelib-1_0-ECal-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613905" version="1" comment="typelib-1_0-EDataBook-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348222" version="1" comment="typelib-1_0-EDataBook-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613906" version="1" comment="typelib-1_0-EDataCal-2_0 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348223" version="1" comment="typelib-1_0-EDataCal-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613907" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348224" version="1" comment="typelib-1_0-EDataServer-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613908" version="1" comment="typelib-1_0-EDataServerUI-1_2 is &lt;3.34.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348225" version="1" comment="typelib-1_0-EDataServerUI-1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614558" version="1" comment="alpine is &lt;2.24-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353680" version="1" comment="alpine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614559" version="1" comment="pico is &lt;5.07-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353681" version="1" comment="pico is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614560" version="1" comment="pilot is &lt;2.99-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353682" version="1" comment="pilot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612740" version="1" comment="chocolate-doom is &lt;3.0.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286911" version="1" comment="chocolate-doom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612741" version="1" comment="chocolate-doom-bash-completion is &lt;3.0.1-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286912" version="1" comment="chocolate-doom-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611006" version="1" comment="squid is &lt;4.13-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611448" version="1" comment="nodejs10 is &lt;10.22.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251313" version="1" comment="nodejs10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611449" version="1" comment="nodejs10-devel is &lt;10.22.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251314" version="1" comment="nodejs10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611450" version="1" comment="nodejs10-docs is &lt;10.22.1-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251315" version="1" comment="nodejs10-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611443" version="1" comment="nodejs12 is &lt;12.18.4-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294935" version="1" comment="nodejs12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611444" version="1" comment="nodejs12-devel is &lt;12.18.4-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294936" version="1" comment="nodejs12-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611445" version="1" comment="nodejs12-docs is &lt;12.18.4-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294937" version="1" comment="nodejs12-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611451" version="1" comment="npm10 is &lt;10.22.1-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251316" version="1" comment="npm10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611446" version="1" comment="npm12 is &lt;12.18.4-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294938" version="1" comment="npm12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612008" version="1" comment="libunwind is &lt;1.2.1-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177215" version="1" comment="libunwind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612009" version="1" comment="libunwind-32bit is &lt;1.2.1-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243091" version="1" comment="libunwind-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612010" version="1" comment="libunwind-devel is &lt;1.2.1-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243092" version="1" comment="libunwind-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612011" version="1" comment="libzmq5 is &lt;4.2.3-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243098" version="1" comment="libzmq5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612012" version="1" comment="zeromq-devel is &lt;4.2.3-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243101" version="1" comment="zeromq-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612013" version="1" comment="zeromq-tools is &lt;4.2.3-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243102" version="1" comment="zeromq-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611711" version="1" comment="libtensorflow2 is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297592" version="1" comment="libtensorflow2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611712" version="1" comment="libtensorflow2-gnu-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297593" version="1" comment="libtensorflow2-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611713" version="1" comment="libtensorflow2-gnu-openmpi2-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297594" version="1" comment="libtensorflow2-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611714" version="1" comment="libtensorflow_cc2 is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297595" version="1" comment="libtensorflow_cc2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611715" version="1" comment="libtensorflow_cc2-gnu-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297596" version="1" comment="libtensorflow_cc2-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611716" version="1" comment="libtensorflow_cc2-gnu-openmpi2-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297597" version="1" comment="libtensorflow_cc2-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611717" version="1" comment="libtensorflow_framework2 is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297598" version="1" comment="libtensorflow_framework2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611718" version="1" comment="libtensorflow_framework2-gnu-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297599" version="1" comment="libtensorflow_framework2-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611719" version="1" comment="libtensorflow_framework2-gnu-openmpi2-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297600" version="1" comment="libtensorflow_framework2-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611720" version="1" comment="tensorflow2 is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297601" version="1" comment="tensorflow2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611721" version="1" comment="tensorflow2-devel is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297602" version="1" comment="tensorflow2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611722" version="1" comment="tensorflow2-doc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297603" version="1" comment="tensorflow2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611723" version="1" comment="tensorflow2-gnu-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297604" version="1" comment="tensorflow2-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611724" version="1" comment="tensorflow2-gnu-openmpi2-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297605" version="1" comment="tensorflow2-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611725" version="1" comment="tensorflow2-lite is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297606" version="1" comment="tensorflow2-lite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611726" version="1" comment="tensorflow2-lite-devel is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297607" version="1" comment="tensorflow2-lite-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611727" version="1" comment="tensorflow2_2_1_2-gnu-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297608" version="1" comment="tensorflow2_2_1_2-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611728" version="1" comment="tensorflow2_2_1_2-gnu-hpc-devel is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297609" version="1" comment="tensorflow2_2_1_2-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611729" version="1" comment="tensorflow2_2_1_2-gnu-hpc-doc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297610" version="1" comment="tensorflow2_2_1_2-gnu-hpc-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611730" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297611" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611731" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297612" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611732" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is &lt;2.1.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297613" version="1" comment="tensorflow2_2_1_2-gnu-openmpi2-hpc-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611733" version="1" comment="singularity is &lt;3.6.4-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615732" version="1" comment="blueman is &lt;2.1.4-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299760" version="1" comment="blueman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615733" version="1" comment="blueman-lang is &lt;2.1.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299761" version="1" comment="blueman-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615734" version="1" comment="thunar-sendto-blueman is &lt;2.1.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299762" version="1" comment="thunar-sendto-blueman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613139" version="1" comment="containerd is &lt;1.3.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613140" version="1" comment="containerd-ctr is &lt;1.3.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153865" version="1" comment="containerd-ctr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613141" version="1" comment="docker is &lt;19.03.15_ce-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613142" version="1" comment="docker-bash-completion is &lt;19.03.15_ce-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152506" version="1" comment="docker-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613143" version="1" comment="docker-fish-completion is &lt;19.03.15_ce-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343480" version="1" comment="docker-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613144" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171077" version="1" comment="docker-libnetwork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613145" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171078" version="1" comment="docker-runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613146" version="1" comment="docker-test is &lt;19.03.15_ce-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152507" version="1" comment="docker-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613147" version="1" comment="docker-zsh-completion is &lt;19.03.15_ce-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152508" version="1" comment="docker-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613148" version="1" comment="fish is &lt;2.7.1-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343481" version="1" comment="fish is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613149" version="1" comment="fish-devel is &lt;2.7.1-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343482" version="1" comment="fish-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613150" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171080" version="1" comment="golang-github-docker-libnetwork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612055" version="1" comment="moinmoin-wiki is &lt;1.9.11-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237153" version="1" comment="moinmoin-wiki is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609992" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177161" version="1" comment="libIlmImf-2_2-23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609993" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251976" version="1" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609994" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251977" version="1" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609995" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251978" version="1" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609996" version="1" comment="openexr is &lt;2.2.1-lp152.7.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172752" version="1" comment="openexr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609997" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151255" version="1" comment="openexr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609998" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172753" version="1" comment="openexr-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611038" version="1" comment="kf5-mediainfo is &lt;20.08-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293412" version="1" comment="kf5-mediainfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611039" version="1" comment="libmediainfo-devel is &lt;20.08-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258260" version="1" comment="libmediainfo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611040" version="1" comment="libmediainfo0 is &lt;20.08-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258262" version="1" comment="libmediainfo0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611041" version="1" comment="libmediainfo0-32bit is &lt;20.08-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258264" version="1" comment="libmediainfo0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611042" version="1" comment="mediainfo is &lt;20.08-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293413" version="1" comment="mediainfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611043" version="1" comment="mediainfo-gui is &lt;20.08-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293414" version="1" comment="mediainfo-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610361" version="1" comment="hylafax+ is &lt;7.0.3-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235038" version="1" comment="hylafax+ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610362" version="1" comment="hylafax+-client is &lt;7.0.3-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235040" version="1" comment="hylafax+-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610363" version="1" comment="libfaxutil7_0_3 is &lt;7.0.3-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289522" version="1" comment="libfaxutil7_0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612357" version="1" comment="kernel-debug is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612358" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612359" version="1" comment="kernel-default is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612463" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.57.1.lp152.8.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612464" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.57.1.lp152.8.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612362" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612363" version="1" comment="kernel-devel is &lt;5.3.18-lp152.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612364" version="1" comment="kernel-docs is &lt;5.3.18-lp152.54.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612365" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.54.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612366" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612367" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612368" version="1" comment="kernel-macros is &lt;5.3.18-lp152.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612369" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612370" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612371" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612372" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612373" version="1" comment="kernel-source is &lt;5.3.18-lp152.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612374" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612375" version="1" comment="kernel-syms is &lt;5.3.18-lp152.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610209" version="1" comment="libraw-devel is &lt;0.18.9-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151901" version="1" comment="libraw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610210" version="1" comment="libraw-devel-static is &lt;0.18.9-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153172" version="1" comment="libraw-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610211" version="1" comment="libraw-tools is &lt;0.18.9-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153173" version="1" comment="libraw-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610212" version="1" comment="libraw16 is &lt;0.18.9-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177187" version="1" comment="libraw16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616459" version="1" comment="bouncycastle is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153068" version="1" comment="bouncycastle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616460" version="1" comment="bouncycastle-javadoc is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153069" version="1" comment="bouncycastle-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616461" version="1" comment="bouncycastle-mail is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616465" version="1" comment="bouncycastle-mail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616462" version="1" comment="bouncycastle-pg is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616466" version="1" comment="bouncycastle-pg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616463" version="1" comment="bouncycastle-pkix is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616467" version="1" comment="bouncycastle-pkix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616464" version="1" comment="bouncycastle-tls is &lt;1.64-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616468" version="1" comment="bouncycastle-tls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610310" version="1" comment="MozillaFirefox is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610311" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610312" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610313" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610314" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610315" version="1" comment="MozillaFirefox-translations-other is &lt;78.1.0-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610357" version="1" comment="MozillaThunderbird is &lt;68.11.0-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610358" version="1" comment="MozillaThunderbird-translations-common is &lt;68.11.0-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610359" version="1" comment="MozillaThunderbird-translations-other is &lt;68.11.0-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610316" version="1" comment="gstreamer-plugin-pipewire is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291464" version="1" comment="gstreamer-plugin-pipewire is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610317" version="1" comment="libpipewire-0_3-0 is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291465" version="1" comment="libpipewire-0_3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610318" version="1" comment="pipewire is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291466" version="1" comment="pipewire is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610319" version="1" comment="pipewire-devel is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291467" version="1" comment="pipewire-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610320" version="1" comment="pipewire-doc is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291468" version="1" comment="pipewire-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610321" version="1" comment="pipewire-libjack-0_3 is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291469" version="1" comment="pipewire-libjack-0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610322" version="1" comment="pipewire-libpulse-0_3 is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291470" version="1" comment="pipewire-libpulse-0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610323" version="1" comment="pipewire-modules is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291471" version="1" comment="pipewire-modules is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610324" version="1" comment="pipewire-spa-plugins-0_2 is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291472" version="1" comment="pipewire-spa-plugins-0_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610325" version="1" comment="pipewire-spa-tools is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291473" version="1" comment="pipewire-spa-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610326" version="1" comment="pipewire-tools is &lt;0.3.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291474" version="1" comment="pipewire-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611044" version="1" comment="MozillaFirefox is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611045" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611046" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611047" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611048" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611049" version="1" comment="MozillaFirefox-translations-other is &lt;78.2.0-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611050" version="1" comment="MozillaThunderbird is &lt;68.12.0-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611051" version="1" comment="MozillaThunderbird-translations-common is &lt;68.12.0-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611052" version="1" comment="MozillaThunderbird-translations-other is &lt;68.12.0-lp152.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611389" version="1" comment="MozillaFirefox is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611390" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611391" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611392" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611393" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611394" version="1" comment="MozillaFirefox-translations-other is &lt;78.3.0-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611770" version="1" comment="MozillaThunderbird is &lt;78.4.0-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611771" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.0-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611772" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.0-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611773" version="1" comment="mozilla-nspr is &lt;4.25.1-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611774" version="1" comment="mozilla-nspr-32bit is &lt;4.25.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611775" version="1" comment="mozilla-nspr-devel is &lt;4.25.1-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611705" version="1" comment="MozillaFirefox is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611706" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611707" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611708" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611709" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611710" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.0-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612999" version="1" comment="MozillaThunderbird is &lt;78.7.0-lp152.2.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613000" version="1" comment="MozillaThunderbird-translations-common is &lt;78.7.0-lp152.2.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613001" version="1" comment="MozillaThunderbird-translations-other is &lt;78.7.0-lp152.2.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610724" version="1" comment="grub2 is &lt;2.04-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610725" version="1" comment="grub2-branding-upstream is &lt;2.04-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610726" version="1" comment="grub2-i386-efi is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610727" version="1" comment="grub2-i386-efi-debug is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610728" version="1" comment="grub2-i386-pc is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610729" version="1" comment="grub2-i386-pc-debug is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610730" version="1" comment="grub2-i386-xen is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610731" version="1" comment="grub2-snapper-plugin is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610732" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610733" version="1" comment="grub2-x86_64-efi is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610734" version="1" comment="grub2-x86_64-efi-debug is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610735" version="1" comment="grub2-x86_64-xen is &lt;2.04-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611735" version="1" comment="libvirt is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611736" version="1" comment="libvirt-admin is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611737" version="1" comment="libvirt-bash-completion is &lt;6.0.0-lp152.9.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611738" version="1" comment="libvirt-client is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611739" version="1" comment="libvirt-daemon is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611740" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611741" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611742" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611743" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-lp152.9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611744" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611745" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611746" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611747" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611748" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611749" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611750" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611751" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611752" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611753" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611754" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611755" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611756" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611757" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-lp152.9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611758" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611759" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611760" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611761" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611762" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-lp152.9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611763" version="1" comment="libvirt-devel is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611764" version="1" comment="libvirt-devel-32bit is &lt;6.0.0-lp152.9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611765" version="1" comment="libvirt-doc is &lt;6.0.0-lp152.9.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611766" version="1" comment="libvirt-libs is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611767" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611768" version="1" comment="libvirt-nss is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611769" version="1" comment="wireshark-plugin-libvirt is &lt;6.0.0-lp152.9.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611105" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152789" version="1" comment="libldap-2_4-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611106" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152790" version="1" comment="libldap-2_4-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611107" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154130" version="1" comment="libldap-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611108" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152657" version="1" comment="openldap2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611109" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152793" version="1" comment="openldap2-back-meta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611110" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152794" version="1" comment="openldap2-back-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611111" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162108" version="1" comment="openldap2-back-sock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611112" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152795" version="1" comment="openldap2-back-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611113" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152796" version="1" comment="openldap2-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611114" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162109" version="1" comment="openldap2-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611115" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152797" version="1" comment="openldap2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611116" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152798" version="1" comment="openldap2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611117" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152799" version="1" comment="openldap2-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611118" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152800" version="1" comment="openldap2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611119" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162110" version="1" comment="openldap2-ppolicy-check-password is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611452" version="1" comment="qemu is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611453" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611454" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611455" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611456" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611457" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611458" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611459" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611460" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611461" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611462" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611463" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611464" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611465" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611466" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611467" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611468" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611469" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611470" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611471" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611472" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611473" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611474" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611475" version="1" comment="qemu-sgabios is &lt;8-lp152.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611476" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611477" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611478" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611479" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611480" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611481" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611482" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611483" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611484" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610219" version="1" comment="ghostscript is &lt;9.52-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151933" version="1" comment="ghostscript is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610220" version="1" comment="ghostscript-devel is &lt;9.52-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151934" version="1" comment="ghostscript-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610221" version="1" comment="ghostscript-mini is &lt;9.52-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151935" version="1" comment="ghostscript-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610222" version="1" comment="ghostscript-mini-devel is &lt;9.52-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151936" version="1" comment="ghostscript-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610223" version="1" comment="ghostscript-x11 is &lt;9.52-lp152.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151937" version="1" comment="ghostscript-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625249" version="1" comment="claws-mail is &lt;3.18.0-lp152.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151767" version="1" comment="claws-mail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625250" version="1" comment="claws-mail-devel is &lt;3.18.0-lp152.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153189" version="1" comment="claws-mail-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625251" version="1" comment="claws-mail-lang is &lt;3.18.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151768" version="1" comment="claws-mail-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611056" version="1" comment="libetpan-devel is &lt;1.9.4-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169764" version="1" comment="libetpan-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611057" version="1" comment="libetpan20 is &lt;1.9.4-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293415" version="1" comment="libetpan20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605286" version="1" comment="chromedriver is &lt;85.0.4183.102-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605287" version="1" comment="chromium is &lt;85.0.4183.102-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605686" version="1" comment="opera is &lt;71.0.3770.228-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229703" version="1" comment="opera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605397" version="1" comment="chromedriver is &lt;85.0.4183.121-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605398" version="1" comment="chromium is &lt;85.0.4183.121-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605683" version="1" comment="chromedriver is &lt;86.0.4240.75-lp152.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605684" version="1" comment="chromium is &lt;86.0.4240.75-lp152.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605685" version="1" comment="gn is &lt;0.1807-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296733" version="1" comment="gn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613635" version="1" comment="chromedriver is &lt;87.0.4280.141-lp152.2.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613636" version="1" comment="chromium is &lt;87.0.4280.141-lp152.2.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612944" version="1" comment="opera is &lt;73.0.3856.344-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612517" version="1" comment="MozillaFirefox is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612518" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612519" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612520" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612521" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612522" version="1" comment="MozillaFirefox-translations-other is &lt;78.5.0-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612239" version="1" comment="MozillaThunderbird is &lt;78.5.0-lp152.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612240" version="1" comment="MozillaThunderbird-translations-common is &lt;78.5.0-lp152.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612241" version="1" comment="MozillaThunderbird-translations-other is &lt;78.5.0-lp152.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611674" version="1" comment="chromedriver is &lt;86.0.4240.111-lp152.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611675" version="1" comment="chromium is &lt;86.0.4240.111-lp152.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611688" version="1" comment="freetype2-devel is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151246" version="1" comment="freetype2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611689" version="1" comment="freetype2-devel-32bit is &lt;2.10.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171242" version="1" comment="freetype2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611690" version="1" comment="freetype2-profile-tti35 is &lt;2.10.1-lp152.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283722" version="1" comment="freetype2-profile-tti35 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611691" version="1" comment="ft2demos is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151247" version="1" comment="ft2demos is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611692" version="1" comment="ftbench is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177150" version="1" comment="ftbench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611693" version="1" comment="ftdiff is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177151" version="1" comment="ftdiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611694" version="1" comment="ftdump is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177152" version="1" comment="ftdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611695" version="1" comment="ftgamma is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177153" version="1" comment="ftgamma is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611696" version="1" comment="ftgrid is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177154" version="1" comment="ftgrid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611697" version="1" comment="ftinspect is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177155" version="1" comment="ftinspect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611698" version="1" comment="ftlint is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177156" version="1" comment="ftlint is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611699" version="1" comment="ftmulti is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177157" version="1" comment="ftmulti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611700" version="1" comment="ftstring is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177158" version="1" comment="ftstring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611701" version="1" comment="ftvalid is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177159" version="1" comment="ftvalid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611702" version="1" comment="ftview is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177160" version="1" comment="ftview is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611703" version="1" comment="libfreetype6 is &lt;2.10.1-lp152.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151248" version="1" comment="libfreetype6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611704" version="1" comment="libfreetype6-32bit is &lt;2.10.1-lp152.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151249" version="1" comment="libfreetype6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630524" version="1" comment="python3-CairoSVG is &lt;2.5.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630551" version="1" comment="python3-CairoSVG is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630525" version="1" comment="python3-Pillow is &lt;8.3.1-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630552" version="1" comment="python3-Pillow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630526" version="1" comment="python3-Pillow-tk is &lt;8.3.1-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630553" version="1" comment="python3-Pillow-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606173" version="1" comment="opera is &lt;72.0.3815.320-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615738" version="1" comment="chromedriver is &lt;86.0.4240.183-lp152.2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615739" version="1" comment="chromium is &lt;86.0.4240.183-lp152.2.45.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615740" version="1" comment="chromedriver is &lt;86.0.4240.198-lp152.2.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615741" version="1" comment="chromium is &lt;86.0.4240.198-lp152.2.48.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606639" version="1" comment="opera is &lt;72.0.3815.400-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612398" version="1" comment="chromedriver is &lt;87.0.4280.88-lp152.2.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612399" version="1" comment="chromium is &lt;87.0.4280.88-lp152.2.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612627" version="1" comment="opera is &lt;73.0.3856.284-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612526" version="1" comment="MozillaFirefox is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612527" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612528" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612529" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612530" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612531" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.0-lp152.2.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612523" version="1" comment="MozillaThunderbird is &lt;78.6.0-lp152.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612524" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.0-lp152.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612525" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.0-lp152.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614172" version="1" comment="MozillaFirefox is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614173" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614174" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614175" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614176" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614177" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.1-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615221" version="1" comment="MozillaThunderbird is &lt;78.6.1-lp152.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615222" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.1-lp152.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615223" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.1-lp152.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612986" version="1" comment="chromedriver is &lt;88.0.4324.96-lp152.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612987" version="1" comment="chromium is &lt;88.0.4324.96-lp152.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624179" version="1" comment="libQt5Pdf5 is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624189" version="1" comment="libQt5Pdf5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624180" version="1" comment="libQt5PdfWidgets5 is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624190" version="1" comment="libQt5PdfWidgets5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624181" version="1" comment="libqt5-qtpdf-devel is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624191" version="1" comment="libqt5-qtpdf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624182" version="1" comment="libqt5-qtpdf-examples is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624192" version="1" comment="libqt5-qtpdf-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624183" version="1" comment="libqt5-qtpdf-imports is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624193" version="1" comment="libqt5-qtpdf-imports is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624184" version="1" comment="libqt5-qtpdf-private-headers-devel is &lt;5.15.3-lp152.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624194" version="1" comment="libqt5-qtpdf-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624185" version="1" comment="libqt5-qtwebengine is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152480" version="1" comment="libqt5-qtwebengine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624186" version="1" comment="libqt5-qtwebengine-devel is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152482" version="1" comment="libqt5-qtwebengine-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624187" version="1" comment="libqt5-qtwebengine-examples is &lt;5.15.3-lp152.3.3.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152484" version="1" comment="libqt5-qtwebengine-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624188" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.15.3-lp152.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152485" version="1" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615742" version="1" comment="ark is &lt;20.04.2-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154016" version="1" comment="ark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615743" version="1" comment="ark-lang is &lt;20.04.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289271" version="1" comment="ark-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609882" version="1" comment="libkerfuffle18 is &lt;18.12.3-lp151.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289272" version="1" comment="libkerfuffle18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511912" version="1" comment="libkerfuffle20 is &lt;20.04.2-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291475" version="1" comment="libkerfuffle20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612599" version="1" comment="PackageKit is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174862" version="1" comment="PackageKit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612600" version="1" comment="PackageKit-backend-dnf is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340520" version="1" comment="PackageKit-backend-dnf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612601" version="1" comment="PackageKit-backend-zypp is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174863" version="1" comment="PackageKit-backend-zypp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612602" version="1" comment="PackageKit-branding-upstream is &lt;1.1.13-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174864" version="1" comment="PackageKit-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612603" version="1" comment="PackageKit-devel is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174865" version="1" comment="PackageKit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612604" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174866" version="1" comment="PackageKit-gstreamer-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612605" version="1" comment="PackageKit-gtk3-module is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174867" version="1" comment="PackageKit-gtk3-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612606" version="1" comment="PackageKit-lang is &lt;1.1.13-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174868" version="1" comment="PackageKit-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612607" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174869" version="1" comment="libpackagekit-glib2-18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612608" version="1" comment="libpackagekit-glib2-18-32bit is &lt;1.1.13-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174870" version="1" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612609" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174871" version="1" comment="libpackagekit-glib2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612610" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;1.1.13-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174872" version="1" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612611" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.13-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174873" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612045" version="1" comment="gdm is &lt;3.34.1-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151581" version="1" comment="gdm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612046" version="1" comment="gdm-branding-upstream is &lt;3.34.1-lp152.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235241" version="1" comment="gdm-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612047" version="1" comment="gdm-devel is &lt;3.34.1-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235242" version="1" comment="gdm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612048" version="1" comment="gdm-lang is &lt;3.34.1-lp152.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151582" version="1" comment="gdm-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612049" version="1" comment="gdm-systemd is &lt;3.34.1-lp152.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299571" version="1" comment="gdm-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612050" version="1" comment="gdmflexiserver is &lt;3.34.1-lp152.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151583" version="1" comment="gdmflexiserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612051" version="1" comment="libgdm1 is &lt;3.34.1-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151584" version="1" comment="libgdm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612052" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.34.1-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151585" version="1" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612620" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612621" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612622" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612623" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612624" version="1" comment="openexr is &lt;2.2.1-lp152.7.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612625" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612626" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656679" version="1" comment="binutils is &lt;2.37-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656680" version="1" comment="binutils-devel is &lt;2.37-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656681" version="1" comment="binutils-devel-32bit is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656682" version="1" comment="binutils-gold is &lt;2.37-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656683" version="1" comment="bpftrace is &lt;0.11.4-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654065" version="1" comment="bpftrace is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656684" version="1" comment="bpftrace-tools is &lt;0.11.4-lp152.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654066" version="1" comment="bpftrace-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656685" version="1" comment="cross-aarch64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656686" version="1" comment="cross-arm-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656687" version="1" comment="cross-avr-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656688" version="1" comment="cross-epiphany-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656689" version="1" comment="cross-hppa-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656690" version="1" comment="cross-hppa64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656691" version="1" comment="cross-i386-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656692" version="1" comment="cross-ia64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656693" version="1" comment="cross-m68k-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656694" version="1" comment="cross-mips-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656695" version="1" comment="cross-ppc-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656696" version="1" comment="cross-ppc64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656697" version="1" comment="cross-ppc64le-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656698" version="1" comment="cross-riscv64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656699" version="1" comment="cross-rx-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656700" version="1" comment="cross-s390-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656701" version="1" comment="cross-s390x-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656702" version="1" comment="cross-sparc-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656703" version="1" comment="cross-sparc64-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656704" version="1" comment="cross-spu-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656705" version="1" comment="cross-xtensa-binutils is &lt;2.37-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656706" version="1" comment="libctf-nobfd0 is &lt;2.37-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656707" version="1" comment="libctf0 is &lt;2.37-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651603" version="1" comment="mupdf is &lt;1.12.0-lp152.6.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153561" version="1" comment="mupdf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651604" version="1" comment="mupdf-devel-static is &lt;1.12.0-lp152.6.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153562" version="1" comment="mupdf-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610343" version="1" comment="go1.13 is &lt;1.13.15-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610344" version="1" comment="go1.13-doc is &lt;1.13.15-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610345" version="1" comment="go1.13-race is &lt;1.13.15-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611926" version="1" comment="python2-salt is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174859" version="1" comment="python2-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611927" version="1" comment="python3-salt is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611928" version="1" comment="salt is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611929" version="1" comment="salt-api is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611930" version="1" comment="salt-bash-completion is &lt;3000-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611931" version="1" comment="salt-cloud is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611932" version="1" comment="salt-doc is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611933" version="1" comment="salt-fish-completion is &lt;3000-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611934" version="1" comment="salt-master is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611935" version="1" comment="salt-minion is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611936" version="1" comment="salt-proxy is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611937" version="1" comment="salt-ssh is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611938" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611939" version="1" comment="salt-syndic is &lt;3000-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611940" version="1" comment="salt-zsh-completion is &lt;3000-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611300" version="1" comment="conmon is &lt;2.0.20-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280795" version="1" comment="conmon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611301" version="1" comment="fuse-overlayfs is &lt;1.1.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266785" version="1" comment="fuse-overlayfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611302" version="1" comment="libcontainers-common is &lt;20200727-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611303" version="1" comment="podman is &lt;2.0.6-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611304" version="1" comment="podman-cni-config is &lt;2.0.6-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615744" version="1" comment="lilypond is &lt;2.20.0-lp152.2.5.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177290" version="1" comment="lilypond is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510423" version="1" comment="lilypond-doc is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177292" version="1" comment="lilypond-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510424" version="1" comment="lilypond-doc-cs is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177293" version="1" comment="lilypond-doc-cs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510425" version="1" comment="lilypond-doc-de is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177294" version="1" comment="lilypond-doc-de is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510426" version="1" comment="lilypond-doc-es is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177295" version="1" comment="lilypond-doc-es is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510427" version="1" comment="lilypond-doc-fr is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177296" version="1" comment="lilypond-doc-fr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510428" version="1" comment="lilypond-doc-hu is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177297" version="1" comment="lilypond-doc-hu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510429" version="1" comment="lilypond-doc-it is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177298" version="1" comment="lilypond-doc-it is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510430" version="1" comment="lilypond-doc-ja is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177299" version="1" comment="lilypond-doc-ja is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510431" version="1" comment="lilypond-doc-nl is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177300" version="1" comment="lilypond-doc-nl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510432" version="1" comment="lilypond-doc-zh is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177301" version="1" comment="lilypond-doc-zh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615745" version="1" comment="lilypond-emmentaler-fonts is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177302" version="1" comment="lilypond-emmentaler-fonts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615746" version="1" comment="lilypond-fonts-common is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177303" version="1" comment="lilypond-fonts-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615747" version="1" comment="lilypond-texgy-fonts is &lt;2.20.0-lp152.2.5.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293416" version="1" comment="lilypond-texgy-fonts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613135" version="1" comment="firejail is &lt;0.9.64.4-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291476" version="1" comment="firejail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615748" version="1" comment="pdns is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152980" version="1" comment="pdns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562716" version="1" comment="pdns-backend-geoip is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167901" version="1" comment="pdns-backend-geoip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615749" version="1" comment="pdns-backend-godbc is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167902" version="1" comment="pdns-backend-godbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615750" version="1" comment="pdns-backend-ldap is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152981" version="1" comment="pdns-backend-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615751" version="1" comment="pdns-backend-lua is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152982" version="1" comment="pdns-backend-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609918" version="1" comment="pdns-backend-mydns is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152983" version="1" comment="pdns-backend-mydns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615752" version="1" comment="pdns-backend-mysql is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152984" version="1" comment="pdns-backend-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615753" version="1" comment="pdns-backend-postgresql is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152985" version="1" comment="pdns-backend-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615754" version="1" comment="pdns-backend-remote is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167903" version="1" comment="pdns-backend-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615755" version="1" comment="pdns-backend-sqlite3 is &lt;4.3.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152986" version="1" comment="pdns-backend-sqlite3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611941" version="1" comment="gnome-settings-daemon is &lt;3.34.2+0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154123" version="1" comment="gnome-settings-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611942" version="1" comment="gnome-settings-daemon-devel is &lt;3.34.2+0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298676" version="1" comment="gnome-settings-daemon-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611943" version="1" comment="gnome-settings-daemon-lang is &lt;3.34.2+0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154124" version="1" comment="gnome-settings-daemon-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611944" version="1" comment="gnome-shell is &lt;3.34.5-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151510" version="1" comment="gnome-shell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611945" version="1" comment="gnome-shell-calendar is &lt;3.34.5-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151512" version="1" comment="gnome-shell-calendar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611946" version="1" comment="gnome-shell-devel is &lt;3.34.5-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162388" version="1" comment="gnome-shell-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611947" version="1" comment="gnome-shell-lang is &lt;3.34.5-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151513" version="1" comment="gnome-shell-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611961" version="1" comment="libwireshark13 is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611962" version="1" comment="libwiretap10 is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611963" version="1" comment="libwsutil11 is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611964" version="1" comment="wireshark is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611965" version="1" comment="wireshark-devel is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611966" version="1" comment="wireshark-ui-qt is &lt;3.2.7-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612253" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612254" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612255" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612256" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612257" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612258" version="1" comment="libQt5Concurrent5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612259" version="1" comment="libQt5Core-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612260" version="1" comment="libQt5Core-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612261" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612262" version="1" comment="libQt5Core5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612263" version="1" comment="libQt5Core5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612264" version="1" comment="libQt5DBus-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612265" version="1" comment="libQt5DBus-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612266" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612267" version="1" comment="libQt5DBus5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612268" version="1" comment="libQt5DBus5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612269" version="1" comment="libQt5Gui-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612270" version="1" comment="libQt5Gui-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612271" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612272" version="1" comment="libQt5Gui5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612273" version="1" comment="libQt5Gui5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612274" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612275" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612276" version="1" comment="libQt5Network-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612277" version="1" comment="libQt5Network-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612278" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612279" version="1" comment="libQt5Network5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612280" version="1" comment="libQt5Network5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612281" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612282" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612283" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612284" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612285" version="1" comment="libQt5OpenGL5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612286" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612287" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612288" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612289" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612290" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612291" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612292" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612293" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612294" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612295" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612296" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612297" version="1" comment="libQt5Sql-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612298" version="1" comment="libQt5Sql-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612299" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612300" version="1" comment="libQt5Sql5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612301" version="1" comment="libQt5Sql5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612302" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612303" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612304" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612305" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612306" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612307" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612308" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612309" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612310" version="1" comment="libQt5Test-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612311" version="1" comment="libQt5Test-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612312" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612313" version="1" comment="libQt5Test5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612314" version="1" comment="libQt5Test5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612315" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612316" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612317" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612318" version="1" comment="libQt5Widgets5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612319" version="1" comment="libQt5Widgets5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612320" version="1" comment="libQt5Xml-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612321" version="1" comment="libQt5Xml-devel-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612322" version="1" comment="libQt5Xml5 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612323" version="1" comment="libQt5Xml5-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612324" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612325" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612326" version="1" comment="libqt5-qtbase-examples is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612327" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.12.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612328" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612329" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.12.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612330" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612628" version="1" comment="groovy is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340627" version="1" comment="groovy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612629" version="1" comment="groovy-ant is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340628" version="1" comment="groovy-ant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612630" version="1" comment="groovy-bsf is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340629" version="1" comment="groovy-bsf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612631" version="1" comment="groovy-console is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340630" version="1" comment="groovy-console is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612632" version="1" comment="groovy-docgenerator is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340631" version="1" comment="groovy-docgenerator is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612633" version="1" comment="groovy-groovydoc is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340632" version="1" comment="groovy-groovydoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612634" version="1" comment="groovy-groovysh is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340633" version="1" comment="groovy-groovysh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612635" version="1" comment="groovy-jmx is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340634" version="1" comment="groovy-jmx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612636" version="1" comment="groovy-json is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340635" version="1" comment="groovy-json is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612637" version="1" comment="groovy-jsr223 is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340636" version="1" comment="groovy-jsr223 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612638" version="1" comment="groovy-lib is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340637" version="1" comment="groovy-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612639" version="1" comment="groovy-nio is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340638" version="1" comment="groovy-nio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612640" version="1" comment="groovy-servlet is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340639" version="1" comment="groovy-servlet is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612641" version="1" comment="groovy-sql is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340640" version="1" comment="groovy-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612642" version="1" comment="groovy-swing is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340641" version="1" comment="groovy-swing is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612643" version="1" comment="groovy-templates is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340642" version="1" comment="groovy-templates is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612644" version="1" comment="groovy-test is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340643" version="1" comment="groovy-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612645" version="1" comment="groovy-testng is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340644" version="1" comment="groovy-testng is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612646" version="1" comment="groovy-xml is &lt;2.4.21-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340645" version="1" comment="groovy-xml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613151" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152695" version="1" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613152" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152696" version="1" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613153" version="1" comment="subversion is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151320" version="1" comment="subversion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613154" version="1" comment="subversion-bash-completion is &lt;1.10.6-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152697" version="1" comment="subversion-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613155" version="1" comment="subversion-devel is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151321" version="1" comment="subversion-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613156" version="1" comment="subversion-perl is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151322" version="1" comment="subversion-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613157" version="1" comment="subversion-python is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151323" version="1" comment="subversion-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613158" version="1" comment="subversion-python-ctypes is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154271" version="1" comment="subversion-python-ctypes is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613159" version="1" comment="subversion-ruby is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152698" version="1" comment="subversion-ruby is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613160" version="1" comment="subversion-server is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151324" version="1" comment="subversion-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613161" version="1" comment="subversion-tools is &lt;1.10.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151325" version="1" comment="subversion-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613755" version="1" comment="tomcat is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613756" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613757" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613758" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613759" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613760" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613761" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613762" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613763" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613764" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613765" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615105" version="1" comment="libjpeg-turbo is &lt;1.5.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615106" version="1" comment="libjpeg62 is &lt;62.2.0-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615107" version="1" comment="libjpeg62-32bit is &lt;62.2.0-lp152.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615108" version="1" comment="libjpeg62-devel is &lt;62.2.0-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615109" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-lp152.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615110" version="1" comment="libjpeg62-turbo is &lt;1.5.3-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615111" version="1" comment="libjpeg8 is &lt;8.1.2-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615112" version="1" comment="libjpeg8-32bit is &lt;8.1.2-lp152.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615113" version="1" comment="libjpeg8-devel is &lt;8.1.2-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615114" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-lp152.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615115" version="1" comment="libturbojpeg0 is &lt;8.1.2-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615116" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-lp152.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614683" version="1" comment="graphviz is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614684" version="1" comment="graphviz-devel is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614685" version="1" comment="graphviz-doc is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614686" version="1" comment="graphviz-gd is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614687" version="1" comment="graphviz-gnome is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614688" version="1" comment="graphviz-guile is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614689" version="1" comment="graphviz-gvedit is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614690" version="1" comment="graphviz-java is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614691" version="1" comment="graphviz-lua is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614692" version="1" comment="graphviz-perl is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614693" version="1" comment="graphviz-php is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614694" version="1" comment="graphviz-plugins-core is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614695" version="1" comment="graphviz-python is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614696" version="1" comment="graphviz-ruby is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614697" version="1" comment="graphviz-smyrna is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614698" version="1" comment="graphviz-tcl is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614699" version="1" comment="libgraphviz6 is &lt;2.40.1-lp152.7.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615863" version="1" comment="roundcubemail is &lt;1.3.16-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610001" version="1" comment="ant is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151811" version="1" comment="ant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610002" version="1" comment="ant-antlr is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235582" version="1" comment="ant-antlr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610003" version="1" comment="ant-apache-bcel is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235583" version="1" comment="ant-apache-bcel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610004" version="1" comment="ant-apache-bsf is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235584" version="1" comment="ant-apache-bsf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610005" version="1" comment="ant-apache-log4j is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235585" version="1" comment="ant-apache-log4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610006" version="1" comment="ant-apache-oro is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235586" version="1" comment="ant-apache-oro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610007" version="1" comment="ant-apache-regexp is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235587" version="1" comment="ant-apache-regexp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610008" version="1" comment="ant-apache-resolver is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235588" version="1" comment="ant-apache-resolver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610009" version="1" comment="ant-apache-xalan2 is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235589" version="1" comment="ant-apache-xalan2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610010" version="1" comment="ant-commons-logging is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235590" version="1" comment="ant-commons-logging is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610011" version="1" comment="ant-commons-net is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235591" version="1" comment="ant-commons-net is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610012" version="1" comment="ant-imageio is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291477" version="1" comment="ant-imageio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610013" version="1" comment="ant-javamail is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235592" version="1" comment="ant-javamail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610014" version="1" comment="ant-jdepend is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235593" version="1" comment="ant-jdepend is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610015" version="1" comment="ant-jmf is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151812" version="1" comment="ant-jmf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610016" version="1" comment="ant-jsch is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235594" version="1" comment="ant-jsch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610017" version="1" comment="ant-junit is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151813" version="1" comment="ant-junit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610018" version="1" comment="ant-junit5 is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291478" version="1" comment="ant-junit5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610019" version="1" comment="ant-manual is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235595" version="1" comment="ant-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610020" version="1" comment="ant-scripts is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151814" version="1" comment="ant-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610021" version="1" comment="ant-swing is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151815" version="1" comment="ant-swing is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610022" version="1" comment="ant-testutil is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235596" version="1" comment="ant-testutil is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610023" version="1" comment="ant-xz is &lt;1.10.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291479" version="1" comment="ant-xz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612928" version="1" comment="ImageMagick is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151674" version="1" comment="ImageMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612929" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252941" version="1" comment="ImageMagick-config-7-SUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612930" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252942" version="1" comment="ImageMagick-config-7-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612931" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151675" version="1" comment="ImageMagick-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612932" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp152.12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152592" version="1" comment="ImageMagick-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612933" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp152.12.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151676" version="1" comment="ImageMagick-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612934" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151677" version="1" comment="ImageMagick-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612935" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177175" version="1" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612936" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp152.12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231080" version="1" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612937" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152596" version="1" comment="libMagick++-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612938" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp152.12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152597" version="1" comment="libMagick++-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612939" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177176" version="1" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612940" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231081" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612941" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177177" version="1" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612942" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231082" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612943" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp152.12.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151681" version="1" comment="perl-PerlMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612762" version="1" comment="cargo is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265404" version="1" comment="cargo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612763" version="1" comment="cargo-doc is &lt;1.43.1-lp152.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265405" version="1" comment="cargo-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612764" version="1" comment="clippy is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265406" version="1" comment="clippy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612765" version="1" comment="rls is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265407" version="1" comment="rls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612766" version="1" comment="rust is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238244" version="1" comment="rust is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612767" version="1" comment="rust-analysis is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265408" version="1" comment="rust-analysis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612768" version="1" comment="rust-cbindgen is &lt;0.14.1-lp152.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265409" version="1" comment="rust-cbindgen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612769" version="1" comment="rust-doc is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238245" version="1" comment="rust-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612770" version="1" comment="rust-gdb is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238246" version="1" comment="rust-gdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612771" version="1" comment="rust-src is &lt;1.43.1-lp152.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238247" version="1" comment="rust-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612772" version="1" comment="rust-std-static is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265410" version="1" comment="rust-std-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612773" version="1" comment="rustfmt is &lt;1.43.1-lp152.3.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265411" version="1" comment="rustfmt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612424" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231070" version="1" comment="libopenssl-1_0_0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612425" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp152.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231071" version="1" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612416" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231072" version="1" comment="libopenssl-1_1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612417" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-lp152.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231073" version="1" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612426" version="1" comment="libopenssl10 is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338634" version="1" comment="libopenssl10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612427" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151065" version="1" comment="libopenssl1_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612428" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp152.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151066" version="1" comment="libopenssl1_0_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612429" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152704" version="1" comment="libopenssl1_0_0-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612430" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp152.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152705" version="1" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612431" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171502" version="1" comment="libopenssl1_0_0-steam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612432" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp152.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171503" version="1" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612418" version="1" comment="libopenssl1_1 is &lt;1.1.1d-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177120" version="1" comment="libopenssl1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612419" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-lp152.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177121" version="1" comment="libopenssl1_1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612420" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231074" version="1" comment="libopenssl1_1-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612421" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-lp152.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231075" version="1" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614475" version="1" comment="nodejs10 is &lt;10.23.1-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614476" version="1" comment="nodejs10-devel is &lt;10.23.1-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614477" version="1" comment="nodejs10-docs is &lt;10.23.1-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614466" version="1" comment="nodejs12 is &lt;12.20.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614467" version="1" comment="nodejs12-devel is &lt;12.20.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614468" version="1" comment="nodejs12-docs is &lt;12.20.1-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614478" version="1" comment="npm10 is &lt;10.23.1-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614469" version="1" comment="npm12 is &lt;12.20.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612433" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231076" version="1" comment="openssl-1_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612434" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231077" version="1" comment="openssl-1_0_0-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612435" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp152.8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231078" version="1" comment="openssl-1_0_0-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612422" version="1" comment="openssl-1_1 is &lt;1.1.1d-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177122" version="1" comment="openssl-1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612423" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231079" version="1" comment="openssl-1_1-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653903" version="1" comment="transfig is &lt;3.2.8b-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659206" version="1" comment="libspeex1 is &lt;1.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658869" version="1" comment="libspeex1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659207" version="1" comment="libspeex1-32bit is &lt;1.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658870" version="1" comment="libspeex1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659208" version="1" comment="speex is &lt;1.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658871" version="1" comment="speex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659209" version="1" comment="speex-devel is &lt;1.2-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658872" version="1" comment="speex-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615756" version="1" comment="upx is &lt;3.96-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165780" version="1" comment="upx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615757" version="1" comment="icingacli is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275965" version="1" comment="icingacli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615758" version="1" comment="icingaweb2 is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275967" version="1" comment="icingaweb2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615759" version="1" comment="icingaweb2-common is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275969" version="1" comment="icingaweb2-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615760" version="1" comment="icingaweb2-vendor-HTMLPurifier is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275971" version="1" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615761" version="1" comment="icingaweb2-vendor-JShrink is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275973" version="1" comment="icingaweb2-vendor-JShrink is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615762" version="1" comment="icingaweb2-vendor-Parsedown is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275975" version="1" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615763" version="1" comment="icingaweb2-vendor-dompdf is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275977" version="1" comment="icingaweb2-vendor-dompdf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615764" version="1" comment="icingaweb2-vendor-lessphp is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275979" version="1" comment="icingaweb2-vendor-lessphp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615765" version="1" comment="icingaweb2-vendor-zf1 is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275981" version="1" comment="icingaweb2-vendor-zf1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615766" version="1" comment="php-Icinga is &lt;2.7.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275983" version="1" comment="php-Icinga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624156" version="1" comment="liblua5_3-5 is &lt;5.3.6-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244414" version="1" comment="liblua5_3-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624157" version="1" comment="liblua5_3-5-32bit is &lt;5.3.6-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244415" version="1" comment="liblua5_3-5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624158" version="1" comment="lua53 is &lt;5.3.6-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244416" version="1" comment="lua53 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624159" version="1" comment="lua53-devel is &lt;5.3.6-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244417" version="1" comment="lua53-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624160" version="1" comment="lua53-doc is &lt;5.3.6-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244418" version="1" comment="lua53-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615068" version="1" comment="ucode-intel is &lt;20210525-lp152.2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611422" version="1" comment="go1.14 is &lt;1.14.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611423" version="1" comment="go1.14-doc is &lt;1.14.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611424" version="1" comment="go1.14-race is &lt;1.14.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624092" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624093" version="1" comment="cluster-md-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624094" version="1" comment="dlm-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624095" version="1" comment="dlm-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624096" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624097" version="1" comment="gfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614999" version="1" comment="kernel-debug is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615000" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615001" version="1" comment="kernel-default is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615002" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.78.1.lp152.8.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615003" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.78.1.lp152.8.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615004" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615005" version="1" comment="kernel-devel is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624098" version="1" comment="kernel-devel-rt is &lt;5.3.18-lp152.3.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615006" version="1" comment="kernel-docs is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615007" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615008" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615009" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615010" version="1" comment="kernel-macros is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615011" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615012" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615013" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615014" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624099" version="1" comment="kernel-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624100" version="1" comment="kernel-rt-devel is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624101" version="1" comment="kernel-rt-extra is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624102" version="1" comment="kernel-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624103" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624104" version="1" comment="kernel-rt_debug-extra is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615015" version="1" comment="kernel-source is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624105" version="1" comment="kernel-source-rt is &lt;5.3.18-lp152.3.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615016" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615017" version="1" comment="kernel-syms is &lt;5.3.18-lp152.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624106" version="1" comment="kernel-syms-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624107" version="1" comment="kselftests-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624108" version="1" comment="kselftests-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624109" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624110" version="1" comment="ocfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624111" version="1" comment="reiserfs-kmp-rt is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624112" version="1" comment="reiserfs-kmp-rt_debug is &lt;5.3.18-lp152.3.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624310" version="1" comment="kernel-debug is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624311" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624312" version="1" comment="kernel-default is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624313" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.81.1.lp152.8.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624314" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.81.1.lp152.8.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624315" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624316" version="1" comment="kernel-devel is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624317" version="1" comment="kernel-docs is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624318" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624319" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624320" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624321" version="1" comment="kernel-macros is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624322" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624323" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624324" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624325" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624326" version="1" comment="kernel-source is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624327" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624328" version="1" comment="kernel-syms is &lt;5.3.18-lp152.81.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615767" version="1" comment="fossil is &lt;2.12.1-lp152.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168274" version="1" comment="fossil is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615768" version="1" comment="ark is &lt;20.04.2-lp152.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615769" version="1" comment="ark-lang is &lt;20.04.2-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609936" version="1" comment="libkerfuffle18 is &lt;18.12.3-lp151.2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511948" version="1" comment="libkerfuffle20 is &lt;20.04.2-lp152.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611676" version="1" comment="gnutls is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611677" version="1" comment="gnutls-guile is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235743" version="1" comment="gnutls-guile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611678" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235744" version="1" comment="libgnutls-dane-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611679" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177127" version="1" comment="libgnutls-dane0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611680" version="1" comment="libgnutls-devel is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151157" version="1" comment="libgnutls-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611681" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp152.9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153803" version="1" comment="libgnutls-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611682" version="1" comment="libgnutls30 is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611683" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp152.9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235745" version="1" comment="libgnutls30-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611684" version="1" comment="libgnutls30-hmac is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281488" version="1" comment="libgnutls30-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611685" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-lp152.9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281489" version="1" comment="libgnutls30-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611686" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153805" version="1" comment="libgnutlsxx-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611687" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp152.9.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153806" version="1" comment="libgnutlsxx28 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611120" version="1" comment="libxml2-2 is &lt;2.9.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611121" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151138" version="1" comment="libxml2-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611122" version="1" comment="libxml2-devel is &lt;2.9.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151139" version="1" comment="libxml2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611123" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp152.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152663" version="1" comment="libxml2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611124" version="1" comment="libxml2-doc is &lt;2.9.7-lp152.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152664" version="1" comment="libxml2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611125" version="1" comment="libxml2-tools is &lt;2.9.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611126" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237173" version="1" comment="python2-libxml2-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611127" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp152.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177126" version="1" comment="python3-libxml2-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614745" version="1" comment="libass-devel is &lt;0.14.0-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153843" version="1" comment="libass-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614746" version="1" comment="libass9 is &lt;0.14.0-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177230" version="1" comment="libass9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614747" version="1" comment="libass9-32bit is &lt;0.14.0-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348105" version="1" comment="libass9-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605185" version="1" comment="python2-Flask-Cors is &lt;3.0.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009292844" version="1" comment="python2-Flask-Cors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605186" version="1" comment="python3-Flask-Cors is &lt;3.0.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009292846" version="1" comment="python3-Flask-Cors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605285" version="1" comment="singularity is &lt;3.6.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615080" version="1" comment="squid is &lt;4.15-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613038" version="1" comment="kernel-debug is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613039" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613040" version="1" comment="kernel-default is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613041" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.63.1.lp152.8.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613042" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.63.1.lp152.8.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613043" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613044" version="1" comment="kernel-devel is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613045" version="1" comment="kernel-docs is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613046" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613047" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613048" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613049" version="1" comment="kernel-macros is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613050" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613051" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613052" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613053" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613054" version="1" comment="kernel-source is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613055" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613056" version="1" comment="kernel-syms is &lt;5.3.18-lp152.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611498" version="1" comment="libproxy-devel is &lt;0.4.15-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151761" version="1" comment="libproxy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611499" version="1" comment="libproxy-sharp is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295954" version="1" comment="libproxy-sharp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611500" version="1" comment="libproxy-tools is &lt;0.4.15-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295955" version="1" comment="libproxy-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611501" version="1" comment="libproxy1 is &lt;0.4.15-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151762" version="1" comment="libproxy1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611502" version="1" comment="libproxy1-32bit is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295956" version="1" comment="libproxy1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611503" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151763" version="1" comment="libproxy1-config-gnome3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611504" version="1" comment="libproxy1-config-kde is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154112" version="1" comment="libproxy1-config-kde is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611505" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151765" version="1" comment="libproxy1-networkmanager is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611506" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151766" version="1" comment="libproxy1-pacrunner-webkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611507" version="1" comment="perl-Net-Libproxy is &lt;0.4.15-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295957" version="1" comment="perl-Net-Libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611508" version="1" comment="python-libproxy is &lt;0.4.15-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295958" version="1" comment="python-libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611509" version="1" comment="python3-libproxy is &lt;0.4.15-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295959" version="1" comment="python3-libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613304" version="1" comment="gnuplot is &lt;5.2.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251345" version="1" comment="gnuplot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613305" version="1" comment="gnuplot-doc is &lt;5.2.2-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251346" version="1" comment="gnuplot-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611435" version="1" comment="xen is &lt;4.13.1_08-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611436" version="1" comment="xen-devel is &lt;4.13.1_08-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611437" version="1" comment="xen-doc-html is &lt;4.13.1_08-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611438" version="1" comment="xen-libs is &lt;4.13.1_08-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611439" version="1" comment="xen-libs-32bit is &lt;4.13.1_08-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611440" version="1" comment="xen-tools is &lt;4.13.1_08-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611441" version="1" comment="xen-tools-domU is &lt;4.13.1_08-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611442" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_08-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613849" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260282" version="1" comment="libruby2_5-2_5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613850" version="1" comment="ruby2.5 is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260286" version="1" comment="ruby2.5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613851" version="1" comment="ruby2.5-devel is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260288" version="1" comment="ruby2.5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613852" version="1" comment="ruby2.5-devel-extra is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260290" version="1" comment="ruby2.5-devel-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613853" version="1" comment="ruby2.5-doc is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260292" version="1" comment="ruby2.5-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613854" version="1" comment="ruby2.5-doc-ri is &lt;2.5.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260294" version="1" comment="ruby2.5-doc-ri is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613855" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260296" version="1" comment="ruby2.5-stdlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613252" version="1" comment="python3-djangorestframework is &lt;3.11.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009345813" version="1" comment="python3-djangorestframework is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613002" version="1" comment="jackson-databind is &lt;2.10.5.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342652" version="1" comment="jackson-databind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613003" version="1" comment="jackson-databind-javadoc is &lt;2.10.5.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342653" version="1" comment="jackson-databind-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611990" version="1" comment="spice-vdagent is &lt;0.19.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171081" version="1" comment="spice-vdagent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611776" version="1" comment="libpacemaker-devel is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153792" version="1" comment="libpacemaker-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611777" version="1" comment="libpacemaker3 is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153793" version="1" comment="libpacemaker3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611778" version="1" comment="pacemaker is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153794" version="1" comment="pacemaker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611779" version="1" comment="pacemaker-cli is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153795" version="1" comment="pacemaker-cli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611780" version="1" comment="pacemaker-cts is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153796" version="1" comment="pacemaker-cts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611781" version="1" comment="pacemaker-remote is &lt;2.0.4+20200616.2deceaa3a-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153797" version="1" comment="pacemaker-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615478" version="1" comment="python2-cryptography is &lt;2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238250" version="1" comment="python2-cryptography is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615479" version="1" comment="python2-cryptography-vectors is &lt;2.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350110" version="1" comment="python2-cryptography-vectors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615695" version="1" comment="python3-cryptography is &lt;2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238251" version="1" comment="python3-cryptography is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615696" version="1" comment="python3-cryptography-vectors is &lt;2.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350540" version="1" comment="python3-cryptography-vectors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612182" version="1" comment="ceph is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154227" version="1" comment="ceph is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612183" version="1" comment="ceph-base is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154228" version="1" comment="ceph-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612184" version="1" comment="ceph-common is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154229" version="1" comment="ceph-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612185" version="1" comment="ceph-fuse is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154230" version="1" comment="ceph-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612186" version="1" comment="ceph-grafana-dashboards is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278215" version="1" comment="ceph-grafana-dashboards is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612187" version="1" comment="ceph-immutable-object-cache is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303051" version="1" comment="ceph-immutable-object-cache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612188" version="1" comment="ceph-mds is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154231" version="1" comment="ceph-mds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612189" version="1" comment="ceph-mgr is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177893" version="1" comment="ceph-mgr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612190" version="1" comment="ceph-mgr-cephadm is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303052" version="1" comment="ceph-mgr-cephadm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612191" version="1" comment="ceph-mgr-dashboard is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278216" version="1" comment="ceph-mgr-dashboard is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612192" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278217" version="1" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612193" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278218" version="1" comment="ceph-mgr-diskprediction-local is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612194" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278219" version="1" comment="ceph-mgr-k8sevents is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612195" version="1" comment="ceph-mgr-modules-core is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303053" version="1" comment="ceph-mgr-modules-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612196" version="1" comment="ceph-mgr-rook is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278220" version="1" comment="ceph-mgr-rook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612197" version="1" comment="ceph-mon is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154232" version="1" comment="ceph-mon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612198" version="1" comment="ceph-osd is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154233" version="1" comment="ceph-osd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612199" version="1" comment="ceph-prometheus-alerts is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278222" version="1" comment="ceph-prometheus-alerts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612200" version="1" comment="ceph-radosgw is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154234" version="1" comment="ceph-radosgw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612201" version="1" comment="ceph-test is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154236" version="1" comment="ceph-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612202" version="1" comment="cephadm is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303054" version="1" comment="cephadm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612203" version="1" comment="cephfs-shell is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278223" version="1" comment="cephfs-shell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612204" version="1" comment="libcephfs-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154237" version="1" comment="libcephfs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612205" version="1" comment="libcephfs2 is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177894" version="1" comment="libcephfs2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612206" version="1" comment="librados-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154239" version="1" comment="librados-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612207" version="1" comment="librados2 is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154240" version="1" comment="librados2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612208" version="1" comment="libradospp-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278224" version="1" comment="libradospp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612209" version="1" comment="librbd-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154243" version="1" comment="librbd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612210" version="1" comment="librbd1 is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154244" version="1" comment="librbd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612211" version="1" comment="librgw-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154245" version="1" comment="librgw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612212" version="1" comment="librgw2 is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154246" version="1" comment="librgw2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612213" version="1" comment="python3-ceph-argparse is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177896" version="1" comment="python3-ceph-argparse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612214" version="1" comment="python3-ceph-common is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303055" version="1" comment="python3-ceph-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612215" version="1" comment="python3-cephfs is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177897" version="1" comment="python3-cephfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612216" version="1" comment="python3-rados is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177898" version="1" comment="python3-rados is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612217" version="1" comment="python3-rbd is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177899" version="1" comment="python3-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612218" version="1" comment="python3-rgw is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177900" version="1" comment="python3-rgw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612219" version="1" comment="rados-objclass-devel is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177901" version="1" comment="rados-objclass-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612220" version="1" comment="rbd-fuse is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154251" version="1" comment="rbd-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612221" version="1" comment="rbd-mirror is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154252" version="1" comment="rbd-mirror is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612222" version="1" comment="rbd-nbd is &lt;15.2.5.667+g1a579d5bf2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154253" version="1" comment="rbd-nbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614193" version="1" comment="kernel-debug is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614194" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614195" version="1" comment="kernel-default is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614196" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.72.1.lp152.8.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614197" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.72.1.lp152.8.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614198" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614199" version="1" comment="kernel-devel is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614200" version="1" comment="kernel-docs is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614201" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614202" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614203" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614204" version="1" comment="kernel-macros is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614205" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614206" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614207" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614208" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614209" version="1" comment="kernel-source is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614210" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614211" version="1" comment="kernel-syms is &lt;5.3.18-lp152.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614109" version="1" comment="ceph is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614110" version="1" comment="ceph-base is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614111" version="1" comment="ceph-common is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614112" version="1" comment="ceph-fuse is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614113" version="1" comment="ceph-grafana-dashboards is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614114" version="1" comment="ceph-immutable-object-cache is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614115" version="1" comment="ceph-mds is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614116" version="1" comment="ceph-mgr is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614117" version="1" comment="ceph-mgr-cephadm is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614118" version="1" comment="ceph-mgr-dashboard is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614119" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614120" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614121" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614122" version="1" comment="ceph-mgr-modules-core is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614123" version="1" comment="ceph-mgr-rook is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614124" version="1" comment="ceph-mon is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614125" version="1" comment="ceph-osd is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614126" version="1" comment="ceph-prometheus-alerts is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614127" version="1" comment="ceph-radosgw is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614128" version="1" comment="ceph-test is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614129" version="1" comment="cephadm is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614130" version="1" comment="cephfs-shell is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614131" version="1" comment="libcephfs-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614132" version="1" comment="libcephfs2 is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614133" version="1" comment="librados-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614134" version="1" comment="librados2 is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614135" version="1" comment="libradospp-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614136" version="1" comment="librbd-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614137" version="1" comment="librbd1 is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614138" version="1" comment="librgw-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614139" version="1" comment="librgw2 is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614140" version="1" comment="python3-ceph-argparse is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614141" version="1" comment="python3-ceph-common is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614142" version="1" comment="python3-cephfs is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614143" version="1" comment="python3-rados is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614144" version="1" comment="python3-rbd is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614145" version="1" comment="python3-rgw is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614146" version="1" comment="rados-objclass-devel is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614147" version="1" comment="rbd-fuse is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614148" version="1" comment="rbd-mirror is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614149" version="1" comment="rbd-nbd is &lt;15.2.9.83+g4275378de0-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612926" version="1" comment="dnsmasq is &lt;2.78-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612927" version="1" comment="dnsmasq-utils is &lt;2.78-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612020" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612021" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612022" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612023" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612024" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612025" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612026" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612027" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612028" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612029" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612030" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612031" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612032" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612033" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612034" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612094" version="1" comment="libecpg6 is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612095" version="1" comment="libecpg6-32bit is &lt;12.5-lp152.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612096" version="1" comment="libpq5 is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612097" version="1" comment="libpq5-32bit is &lt;12.5-lp152.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613285" version="1" comment="postgresql is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613286" version="1" comment="postgresql-contrib is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613287" version="1" comment="postgresql-devel is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613288" version="1" comment="postgresql-docs is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613289" version="1" comment="postgresql-llvmjit is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613290" version="1" comment="postgresql-plperl is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613291" version="1" comment="postgresql-plpython is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613292" version="1" comment="postgresql-pltcl is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613293" version="1" comment="postgresql-server is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613294" version="1" comment="postgresql-server-devel is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613295" version="1" comment="postgresql-test is &lt;13-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612109" version="1" comment="postgresql10 is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612110" version="1" comment="postgresql10-contrib is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612111" version="1" comment="postgresql10-devel is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612112" version="1" comment="postgresql10-docs is &lt;10.15-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612113" version="1" comment="postgresql10-plperl is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612114" version="1" comment="postgresql10-plpython is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612115" version="1" comment="postgresql10-pltcl is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612116" version="1" comment="postgresql10-server is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612117" version="1" comment="postgresql10-test is &lt;10.15-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612098" version="1" comment="postgresql12 is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612099" version="1" comment="postgresql12-contrib is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612100" version="1" comment="postgresql12-devel is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612101" version="1" comment="postgresql12-docs is &lt;12.5-lp152.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612102" version="1" comment="postgresql12-llvmjit is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612103" version="1" comment="postgresql12-plperl is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612104" version="1" comment="postgresql12-plpython is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612105" version="1" comment="postgresql12-pltcl is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612106" version="1" comment="postgresql12-server is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612107" version="1" comment="postgresql12-server-devel is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612108" version="1" comment="postgresql12-test is &lt;12.5-lp152.3.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612360" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.54.1.lp152.8.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612361" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.54.1.lp152.8.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612882" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612883" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612884" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612885" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612886" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612887" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612888" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612889" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612890" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612891" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612892" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612893" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612894" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612895" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612896" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661712" version="1" comment="ctdb is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661713" version="1" comment="ctdb-pcp-pmda is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661714" version="1" comment="ctdb-tests is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661715" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661716" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661717" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661718" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661719" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661720" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661721" version="1" comment="libdcerpc0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661722" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661723" version="1" comment="libndr-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661724" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661725" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661726" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661727" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661728" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661729" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661730" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661731" version="1" comment="libndr-standard0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661732" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661733" version="1" comment="libndr0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661734" version="1" comment="libndr0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661735" version="1" comment="libnetapi-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661736" version="1" comment="libnetapi-devel-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661737" version="1" comment="libnetapi0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661738" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661739" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661740" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661741" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661742" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661743" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661744" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661745" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661746" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661747" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661748" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661749" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661750" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661751" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661752" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661753" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661754" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661755" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661756" version="1" comment="libsamba-util0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661757" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661758" version="1" comment="libsamdb-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661759" version="1" comment="libsamdb0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661760" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661761" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661762" version="1" comment="libsmbclient0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661763" version="1" comment="libsmbclient0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661764" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661765" version="1" comment="libsmbconf0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661766" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661767" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661768" version="1" comment="libsmbldap2 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661769" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661770" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661771" version="1" comment="libtevent-util0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661772" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661773" version="1" comment="libwbclient-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661774" version="1" comment="libwbclient0 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661775" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661776" version="1" comment="samba is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661777" version="1" comment="samba-ad-dc is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661778" version="1" comment="samba-ad-dc-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661779" version="1" comment="samba-ceph is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661780" version="1" comment="samba-client is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661781" version="1" comment="samba-client-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661782" version="1" comment="samba-core-devel is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661783" version="1" comment="samba-doc is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661784" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661785" version="1" comment="samba-libs is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661786" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661787" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661788" version="1" comment="samba-libs-python3-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661789" version="1" comment="samba-python3 is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661790" version="1" comment="samba-test is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661791" version="1" comment="samba-winbind is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661792" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.313.d4e302805e1-lp152.3.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612057" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp152.3.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612058" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp152.3.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612059" version="1" comment="python is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612060" version="1" comment="python-32bit is &lt;2.7.17-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612061" version="1" comment="python-base is &lt;2.7.17-lp152.3.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612062" version="1" comment="python-base-32bit is &lt;2.7.17-lp152.3.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612063" version="1" comment="python-curses is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612064" version="1" comment="python-demo is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612065" version="1" comment="python-devel is &lt;2.7.17-lp152.3.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612066" version="1" comment="python-doc is &lt;2.7.17-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612067" version="1" comment="python-doc-pdf is &lt;2.7.17-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612068" version="1" comment="python-gdbm is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612069" version="1" comment="python-idle is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612070" version="1" comment="python-tk is &lt;2.7.17-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612071" version="1" comment="python-xml is &lt;2.7.17-lp152.3.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611485" version="1" comment="libXvnc-devel is &lt;1.9.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154213" version="1" comment="libXvnc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611486" version="1" comment="libXvnc1 is &lt;1.9.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154118" version="1" comment="libXvnc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611487" version="1" comment="tigervnc is &lt;1.9.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152053" version="1" comment="tigervnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611488" version="1" comment="tigervnc-x11vnc is &lt;1.9.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276534" version="1" comment="tigervnc-x11vnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611489" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152054" version="1" comment="xorg-x11-Xvnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611490" version="1" comment="xorg-x11-Xvnc-java is &lt;1.9.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276535" version="1" comment="xorg-x11-Xvnc-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611491" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276536" version="1" comment="xorg-x11-Xvnc-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611492" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276537" version="1" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632000" version="1" comment="python-pyOpenSSL-doc is &lt;17.5.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246809" version="1" comment="python-pyOpenSSL-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632001" version="1" comment="python2-cffi is &lt;1.13.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631614" version="1" comment="python2-cffi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632002" version="1" comment="python2-cryptography is &lt;2.8-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632003" version="1" comment="python2-pyOpenSSL is &lt;17.5.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632010" version="1" comment="python2-pyOpenSSL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612436" version="1" comment="python2-urllib3 is &lt;1.24-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264573" version="1" comment="python2-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612437" version="1" comment="python2-urllib3-test is &lt;1.24-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266833" version="1" comment="python2-urllib3-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632004" version="1" comment="python3-cffi is &lt;1.13.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631618" version="1" comment="python3-cffi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632005" version="1" comment="python3-cryptography is &lt;2.8-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632006" version="1" comment="python3-pyOpenSSL is &lt;17.5.0-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177188" version="1" comment="python3-pyOpenSSL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612438" version="1" comment="python3-urllib3 is &lt;1.24-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177231" version="1" comment="python3-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612439" version="1" comment="python3-urllib3-test is &lt;1.24-lp152.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266834" version="1" comment="python3-urllib3-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605501" version="1" comment="kdeconnect-kde is &lt;20.04.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295059" version="1" comment="kdeconnect-kde is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605502" version="1" comment="kdeconnect-kde-lang is &lt;20.04.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295061" version="1" comment="kdeconnect-kde-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605503" version="1" comment="kdeconnect-kde-zsh-completion is &lt;20.04.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295063" version="1" comment="kdeconnect-kde-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613030" version="1" comment="jupyter-notebook is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340862" version="1" comment="jupyter-notebook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613031" version="1" comment="jupyter-notebook-doc is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340863" version="1" comment="jupyter-notebook-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613032" version="1" comment="jupyter-notebook-lang is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340864" version="1" comment="jupyter-notebook-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613033" version="1" comment="jupyter-notebook-latex is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340865" version="1" comment="jupyter-notebook-latex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613034" version="1" comment="python2-notebook is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340867" version="1" comment="python2-notebook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613035" version="1" comment="python2-notebook-lang is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340868" version="1" comment="python2-notebook-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613036" version="1" comment="python3-notebook is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340869" version="1" comment="python3-notebook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613037" version="1" comment="python3-notebook-lang is &lt;5.7.8-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340870" version="1" comment="python3-notebook-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612945" version="1" comment="xstream is &lt;1.4.15-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342347" version="1" comment="xstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612946" version="1" comment="xstream-benchmark is &lt;1.4.15-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342348" version="1" comment="xstream-benchmark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612947" version="1" comment="xstream-javadoc is &lt;1.4.15-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342349" version="1" comment="xstream-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612948" version="1" comment="xstream-parent is &lt;1.4.15-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342350" version="1" comment="xstream-parent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615166" version="1" comment="libwireshark14 is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479977" version="1" comment="libwireshark14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615167" version="1" comment="libwiretap11 is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479978" version="1" comment="libwiretap11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615168" version="1" comment="libwsutil12 is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479979" version="1" comment="libwsutil12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615169" version="1" comment="wireshark is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615170" version="1" comment="wireshark-devel is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615171" version="1" comment="wireshark-ui-qt is &lt;3.4.5-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612176" version="1" comment="libwireshark13 is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612177" version="1" comment="libwiretap10 is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612178" version="1" comment="libwsutil11 is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612179" version="1" comment="wireshark is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612180" version="1" comment="wireshark-devel is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612181" version="1" comment="wireshark-ui-qt is &lt;3.2.8-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614570" version="1" comment="libvlc5 is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614571" version="1" comment="libvlccore9 is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614572" version="1" comment="vlc is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614573" version="1" comment="vlc-codec-gstreamer is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614574" version="1" comment="vlc-devel is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614575" version="1" comment="vlc-jack is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614576" version="1" comment="vlc-lang is &lt;3.0.13-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614577" version="1" comment="vlc-noX is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614578" version="1" comment="vlc-opencv is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614579" version="1" comment="vlc-qt is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614580" version="1" comment="vlc-vdpau is &lt;3.0.13-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613856" version="1" comment="libass-devel is &lt;0.14.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613857" version="1" comment="libass9 is &lt;0.14.0-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613858" version="1" comment="libass9-32bit is &lt;0.14.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615770" version="1" comment="phpMyAdmin is &lt;4.9.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153097" version="1" comment="phpMyAdmin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612035" version="1" comment="MozillaFirefox is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612036" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612037" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612038" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612039" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612040" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.1-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612126" version="1" comment="MozillaThunderbird is &lt;78.4.2-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612127" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.2-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612128" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.2-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613004" version="1" comment="MozillaFirefox is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613005" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613006" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613007" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613008" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613009" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.0-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611953" version="1" comment="bluez is &lt;5.48-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611954" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp152.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611955" version="1" comment="bluez-cups is &lt;5.48-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611956" version="1" comment="bluez-devel is &lt;5.48-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611957" version="1" comment="bluez-devel-32bit is &lt;5.48-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611958" version="1" comment="bluez-test is &lt;5.48-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611959" version="1" comment="libbluetooth3 is &lt;5.48-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611960" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624528" version="1" comment="solo-udev is &lt;4.1.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624529" version="1" comment="solo-udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612897" version="1" comment="jetty-annotations is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340693" version="1" comment="jetty-annotations is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612898" version="1" comment="jetty-client is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340694" version="1" comment="jetty-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612899" version="1" comment="jetty-continuation is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340695" version="1" comment="jetty-continuation is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612900" version="1" comment="jetty-http is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340696" version="1" comment="jetty-http is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612901" version="1" comment="jetty-io is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340697" version="1" comment="jetty-io is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612902" version="1" comment="jetty-jaas is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340698" version="1" comment="jetty-jaas is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612903" version="1" comment="jetty-javax-websocket-client-impl is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340699" version="1" comment="jetty-javax-websocket-client-impl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612904" version="1" comment="jetty-javax-websocket-server-impl is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340700" version="1" comment="jetty-javax-websocket-server-impl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612905" version="1" comment="jetty-jmx is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340701" version="1" comment="jetty-jmx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612906" version="1" comment="jetty-jndi is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340702" version="1" comment="jetty-jndi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612907" version="1" comment="jetty-jsp is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340703" version="1" comment="jetty-jsp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612908" version="1" comment="jetty-minimal-javadoc is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340705" version="1" comment="jetty-minimal-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612909" version="1" comment="jetty-openid is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340706" version="1" comment="jetty-openid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612910" version="1" comment="jetty-plus is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340707" version="1" comment="jetty-plus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612911" version="1" comment="jetty-proxy is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340708" version="1" comment="jetty-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612912" version="1" comment="jetty-security is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340709" version="1" comment="jetty-security is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612913" version="1" comment="jetty-server is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340710" version="1" comment="jetty-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612914" version="1" comment="jetty-servlet is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340711" version="1" comment="jetty-servlet is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612915" version="1" comment="jetty-util is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340712" version="1" comment="jetty-util is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612916" version="1" comment="jetty-util-ajax is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340713" version="1" comment="jetty-util-ajax is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612917" version="1" comment="jetty-webapp is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340714" version="1" comment="jetty-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612918" version="1" comment="jetty-websocket-api is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340716" version="1" comment="jetty-websocket-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612919" version="1" comment="jetty-websocket-client is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340717" version="1" comment="jetty-websocket-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612920" version="1" comment="jetty-websocket-common is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340718" version="1" comment="jetty-websocket-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612921" version="1" comment="jetty-websocket-javadoc is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340719" version="1" comment="jetty-websocket-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612922" version="1" comment="jetty-websocket-server is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340720" version="1" comment="jetty-websocket-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612923" version="1" comment="jetty-websocket-servlet is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340721" version="1" comment="jetty-websocket-servlet is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612924" version="1" comment="jetty-xml is &lt;9.4.35-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340722" version="1" comment="jetty-xml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613909" version="1" comment="eclipse-contributor-tools is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348321" version="1" comment="eclipse-contributor-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613910" version="1" comment="eclipse-contributor-tools-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348322" version="1" comment="eclipse-contributor-tools-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613911" version="1" comment="eclipse-equinox-osgi is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348323" version="1" comment="eclipse-equinox-osgi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613912" version="1" comment="eclipse-equinox-osgi-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348324" version="1" comment="eclipse-equinox-osgi-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613913" version="1" comment="eclipse-jdt is &lt;4.9.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348325" version="1" comment="eclipse-jdt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613914" version="1" comment="eclipse-jdt-bootstrap is &lt;4.9.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348326" version="1" comment="eclipse-jdt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613915" version="1" comment="eclipse-p2-discovery is &lt;4.9.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348327" version="1" comment="eclipse-p2-discovery is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613916" version="1" comment="eclipse-p2-discovery-bootstrap is &lt;4.9.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348328" version="1" comment="eclipse-p2-discovery-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613917" version="1" comment="eclipse-pde is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348329" version="1" comment="eclipse-pde is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613918" version="1" comment="eclipse-pde-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348330" version="1" comment="eclipse-pde-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613919" version="1" comment="eclipse-platform is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348331" version="1" comment="eclipse-platform is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613920" version="1" comment="eclipse-platform-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348332" version="1" comment="eclipse-platform-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613921" version="1" comment="eclipse-swt is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348333" version="1" comment="eclipse-swt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613922" version="1" comment="eclipse-swt-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348334" version="1" comment="eclipse-swt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613923" version="1" comment="eclipse-tests is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348335" version="1" comment="eclipse-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613924" version="1" comment="eclipse-tests-bootstrap is &lt;4.9.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348336" version="1" comment="eclipse-tests-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653854" version="1" comment="civetweb is &lt;1.15-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653861" version="1" comment="civetweb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653855" version="1" comment="civetweb-devel is &lt;1.15-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653862" version="1" comment="civetweb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653856" version="1" comment="libcivetweb-cpp1_15_0 is &lt;1.15-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653863" version="1" comment="libcivetweb-cpp1_15_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653857" version="1" comment="libcivetweb1_15_0 is &lt;1.15-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653864" version="1" comment="libcivetweb1_15_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611967" version="1" comment="ImageMagick is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611968" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611969" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611970" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611971" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611972" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp152.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611973" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611974" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611975" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611976" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611977" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611978" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611979" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611980" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611981" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611982" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp152.12.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612376" version="1" comment="xen is &lt;4.13.2_04-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612377" version="1" comment="xen-devel is &lt;4.13.2_04-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612378" version="1" comment="xen-doc-html is &lt;4.13.2_04-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612379" version="1" comment="xen-libs is &lt;4.13.2_04-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612380" version="1" comment="xen-libs-32bit is &lt;4.13.2_04-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612381" version="1" comment="xen-tools is &lt;4.13.2_04-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612382" version="1" comment="xen-tools-domU is &lt;4.13.2_04-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612383" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_04-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611782" version="1" comment="xen is &lt;4.13.1_10-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611783" version="1" comment="xen-devel is &lt;4.13.1_10-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611784" version="1" comment="xen-doc-html is &lt;4.13.1_10-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611785" version="1" comment="xen-libs is &lt;4.13.1_10-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611786" version="1" comment="xen-libs-32bit is &lt;4.13.1_10-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611787" version="1" comment="xen-tools is &lt;4.13.1_10-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611788" version="1" comment="xen-tools-domU is &lt;4.13.1_10-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611789" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_10-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612129" version="1" comment="libnss_slurm2 is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300283" version="1" comment="libnss_slurm2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612130" version="1" comment="libpmi0 is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615225" version="1" comment="libslurm33 is &lt;18.08.9-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612131" version="1" comment="libslurm35 is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300284" version="1" comment="libslurm35 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612132" version="1" comment="perl-slurm is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612133" version="1" comment="slurm is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612134" version="1" comment="slurm-auth-none is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612135" version="1" comment="slurm-config is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612136" version="1" comment="slurm-config-man is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612137" version="1" comment="slurm-cray is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612138" version="1" comment="slurm-devel is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612139" version="1" comment="slurm-doc is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612140" version="1" comment="slurm-hdf5 is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612141" version="1" comment="slurm-lua is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612142" version="1" comment="slurm-munge is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612143" version="1" comment="slurm-node is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612144" version="1" comment="slurm-openlava is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612145" version="1" comment="slurm-pam_slurm is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612146" version="1" comment="slurm-plugins is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612147" version="1" comment="slurm-rest is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300285" version="1" comment="slurm-rest is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612148" version="1" comment="slurm-seff is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612149" version="1" comment="slurm-sjstat is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612150" version="1" comment="slurm-slurmdbd is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612151" version="1" comment="slurm-sql is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612152" version="1" comment="slurm-sview is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612153" version="1" comment="slurm-torque is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612154" version="1" comment="slurm-webdoc is &lt;20.02.6-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612532" version="1" comment="ceph is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612533" version="1" comment="ceph-base is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612534" version="1" comment="ceph-common is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612535" version="1" comment="ceph-fuse is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612536" version="1" comment="ceph-grafana-dashboards is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612537" version="1" comment="ceph-immutable-object-cache is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612538" version="1" comment="ceph-mds is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612539" version="1" comment="ceph-mgr is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612540" version="1" comment="ceph-mgr-cephadm is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612541" version="1" comment="ceph-mgr-dashboard is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612542" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612543" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612544" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612545" version="1" comment="ceph-mgr-modules-core is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612546" version="1" comment="ceph-mgr-rook is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612547" version="1" comment="ceph-mon is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612548" version="1" comment="ceph-osd is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612549" version="1" comment="ceph-prometheus-alerts is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612550" version="1" comment="ceph-radosgw is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612551" version="1" comment="ceph-test is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612552" version="1" comment="cephadm is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612553" version="1" comment="cephfs-shell is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612554" version="1" comment="libcephfs-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612555" version="1" comment="libcephfs2 is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612556" version="1" comment="librados-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612557" version="1" comment="librados2 is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612558" version="1" comment="libradospp-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612559" version="1" comment="librbd-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612560" version="1" comment="librbd1 is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612561" version="1" comment="librgw-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612562" version="1" comment="librgw2 is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612563" version="1" comment="python3-ceph-argparse is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612564" version="1" comment="python3-ceph-common is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612565" version="1" comment="python3-cephfs is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612566" version="1" comment="python3-rados is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612567" version="1" comment="python3-rbd is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612568" version="1" comment="python3-rgw is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612569" version="1" comment="rados-objclass-devel is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612570" version="1" comment="rbd-fuse is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612571" version="1" comment="rbd-mirror is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612572" version="1" comment="rbd-nbd is &lt;15.2.8.80+g1f4b6229ca-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612397" version="1" comment="pngcheck is &lt;2.3.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338019" version="1" comment="pngcheck is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614801" version="1" comment="libxls-devel is &lt;1.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476345" version="1" comment="libxls-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614802" version="1" comment="libxls-tools is &lt;1.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476346" version="1" comment="libxls-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614803" version="1" comment="libxlsreader8 is &lt;1.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476347" version="1" comment="libxlsreader8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613013" version="1" comment="libopenvswitch-2_13-0 is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342878" version="1" comment="libopenvswitch-2_13-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613014" version="1" comment="libovn-20_03-0 is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342879" version="1" comment="libovn-20_03-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613015" version="1" comment="openvswitch is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162414" version="1" comment="openvswitch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613016" version="1" comment="openvswitch-devel is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162415" version="1" comment="openvswitch-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613017" version="1" comment="openvswitch-doc is &lt;2.13.2-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342880" version="1" comment="openvswitch-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613018" version="1" comment="openvswitch-ipsec is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342881" version="1" comment="openvswitch-ipsec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613019" version="1" comment="openvswitch-pki is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162421" version="1" comment="openvswitch-pki is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613020" version="1" comment="openvswitch-test is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162422" version="1" comment="openvswitch-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613021" version="1" comment="openvswitch-vtep is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162423" version="1" comment="openvswitch-vtep is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613022" version="1" comment="ovn is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342882" version="1" comment="ovn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613023" version="1" comment="ovn-central is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342883" version="1" comment="ovn-central is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613024" version="1" comment="ovn-devel is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342884" version="1" comment="ovn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613025" version="1" comment="ovn-doc is &lt;20.03.1-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342885" version="1" comment="ovn-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613026" version="1" comment="ovn-docker is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342886" version="1" comment="ovn-docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613027" version="1" comment="ovn-host is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342887" version="1" comment="ovn-host is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613028" version="1" comment="ovn-vtep is &lt;20.03.1-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342888" version="1" comment="ovn-vtep is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613029" version="1" comment="python3-ovs is &lt;2.13.2-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342889" version="1" comment="python3-ovs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613188" version="1" comment="jasper is &lt;2.0.14-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613189" version="1" comment="libjasper-devel is &lt;2.0.14-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613190" version="1" comment="libjasper4 is &lt;2.0.14-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613191" version="1" comment="libjasper4-32bit is &lt;2.0.14-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614354" version="1" comment="ctdb is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614355" version="1" comment="ctdb-pcp-pmda is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614356" version="1" comment="ctdb-tests is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613830" version="1" comment="ldb-tools is &lt;2.0.12-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614357" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614358" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614359" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614360" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614361" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614362" version="1" comment="libdcerpc-samr0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614363" version="1" comment="libdcerpc0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614364" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613831" version="1" comment="libldb-devel is &lt;2.0.12-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613832" version="1" comment="libldb2 is &lt;2.0.12-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613833" version="1" comment="libldb2-32bit is &lt;2.0.12-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614365" version="1" comment="libndr-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614366" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614367" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614368" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614369" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614370" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614371" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614372" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614373" version="1" comment="libndr-standard0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614374" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614375" version="1" comment="libndr0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614376" version="1" comment="libndr0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614377" version="1" comment="libnetapi-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614378" version="1" comment="libnetapi-devel-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614379" version="1" comment="libnetapi0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614380" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614381" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614382" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614383" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614384" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614385" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614386" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614387" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614388" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614389" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614390" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614391" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614392" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614393" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614394" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614395" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614396" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614397" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614398" version="1" comment="libsamba-util0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614399" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614400" version="1" comment="libsamdb-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614401" version="1" comment="libsamdb0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614402" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614403" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614404" version="1" comment="libsmbclient0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614405" version="1" comment="libsmbclient0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614406" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614407" version="1" comment="libsmbconf0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614408" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614409" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614410" version="1" comment="libsmbldap2 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614411" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614412" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614413" version="1" comment="libtevent-util0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614414" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614415" version="1" comment="libwbclient-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614416" version="1" comment="libwbclient0 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614417" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613834" version="1" comment="python3-ldb is &lt;2.0.12-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613835" version="1" comment="python3-ldb-32bit is &lt;2.0.12-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613836" version="1" comment="python3-ldb-devel is &lt;2.0.12-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614418" version="1" comment="samba is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614419" version="1" comment="samba-ad-dc is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614420" version="1" comment="samba-ad-dc-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614421" version="1" comment="samba-ceph is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614422" version="1" comment="samba-client is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614423" version="1" comment="samba-client-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614424" version="1" comment="samba-core-devel is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614425" version="1" comment="samba-doc is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614426" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614427" version="1" comment="samba-libs is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614428" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614429" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614430" version="1" comment="samba-libs-python3-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614431" version="1" comment="samba-python3 is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614432" version="1" comment="samba-test is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614433" version="1" comment="samba-winbind is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614434" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.247.8c858f7ee14-lp152.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613614" version="1" comment="chromedriver is &lt;89.0.4389.72-lp152.2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613615" version="1" comment="chromium is &lt;89.0.4389.72-lp152.2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614435" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614436" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.0-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614437" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614438" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.0-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614439" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.0-lp152.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614440" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614441" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614442" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614443" version="1" comment="webkit-jsc-4 is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614444" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614445" version="1" comment="webkit2gtk3-devel is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614446" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.0-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606083" version="1" comment="sddm is &lt;0.18.0-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152215" version="1" comment="sddm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606084" version="1" comment="sddm-branding-openSUSE is &lt;0.18.0-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152216" version="1" comment="sddm-branding-openSUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606085" version="1" comment="sddm-branding-upstream is &lt;0.18.0-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231933" version="1" comment="sddm-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612157" version="1" comment="krb5 is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612158" version="1" comment="krb5-32bit is &lt;1.16.3-lp152.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151006" version="1" comment="krb5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612159" version="1" comment="krb5-client is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151007" version="1" comment="krb5-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612160" version="1" comment="krb5-devel is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151008" version="1" comment="krb5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612161" version="1" comment="krb5-devel-32bit is &lt;1.16.3-lp152.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152677" version="1" comment="krb5-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612162" version="1" comment="krb5-mini is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152679" version="1" comment="krb5-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612163" version="1" comment="krb5-mini-devel is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152680" version="1" comment="krb5-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612164" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152681" version="1" comment="krb5-plugin-kdb-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612165" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152682" version="1" comment="krb5-plugin-preauth-otp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612166" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152683" version="1" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612167" version="1" comment="krb5-server is &lt;1.16.3-lp152.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152684" version="1" comment="krb5-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632480" version="1" comment="dovecot23 is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632481" version="1" comment="dovecot23-backend-mysql is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632482" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632483" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632484" version="1" comment="dovecot23-devel is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632485" version="1" comment="dovecot23-fts is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632486" version="1" comment="dovecot23-fts-lucene is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632487" version="1" comment="dovecot23-fts-solr is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632488" version="1" comment="dovecot23-fts-squat is &lt;2.3.15-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613306" version="1" comment="python2-salt is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613307" version="1" comment="python3-salt is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613308" version="1" comment="salt is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613309" version="1" comment="salt-api is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613310" version="1" comment="salt-bash-completion is &lt;3000-lp152.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613311" version="1" comment="salt-cloud is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613312" version="1" comment="salt-doc is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613313" version="1" comment="salt-fish-completion is &lt;3000-lp152.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613314" version="1" comment="salt-master is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613315" version="1" comment="salt-minion is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613316" version="1" comment="salt-proxy is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613317" version="1" comment="salt-ssh is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613318" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613319" version="1" comment="salt-syndic is &lt;3000-lp152.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613320" version="1" comment="salt-zsh-completion is &lt;3000-lp152.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612172" version="1" comment="go1.14 is &lt;1.14.12-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612173" version="1" comment="go1.14-doc is &lt;1.14.12-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612174" version="1" comment="go1.14-race is &lt;1.14.12-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612247" version="1" comment="go1.15 is &lt;1.15.5-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303056" version="1" comment="go1.15 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612248" version="1" comment="go1.15-doc is &lt;1.15.5-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303057" version="1" comment="go1.15-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612249" version="1" comment="go1.15-race is &lt;1.15.5-lp152.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303058" version="1" comment="go1.15-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630895" version="1" comment="python2-reportlab is &lt;3.4.0-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277408" version="1" comment="python2-reportlab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630896" version="1" comment="python3-reportlab is &lt;3.4.0-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277409" version="1" comment="python3-reportlab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613185" version="1" comment="python-bottle-doc is &lt;0.12.13-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009344034" version="1" comment="python-bottle-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613186" version="1" comment="python2-bottle is &lt;0.12.13-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009344035" version="1" comment="python2-bottle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613187" version="1" comment="python3-bottle is &lt;0.12.13-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009344036" version="1" comment="python3-bottle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624530" version="1" comment="openscad is &lt;2019.05-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624531" version="1" comment="openscad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630467" version="1" comment="mysql-connector-java is &lt;5.1.47-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152673" version="1" comment="mysql-connector-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612250" version="1" comment="mutt is &lt;1.10.1-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612251" version="1" comment="mutt-doc is &lt;1.10.1-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612252" version="1" comment="mutt-lang is &lt;1.10.1-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612083" version="1" comment="rclone is &lt;1.53.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300204" version="1" comment="rclone is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612084" version="1" comment="rclone-bash-completion is &lt;1.53.3-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300205" version="1" comment="rclone-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612085" version="1" comment="rclone-zsh-completion is &lt;1.53.3-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300206" version="1" comment="rclone-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661696" version="1" comment="libp11-kit0 is &lt;0.23.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661793" version="1" comment="libp11-kit0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661697" version="1" comment="libp11-kit0-32bit is &lt;0.23.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661794" version="1" comment="libp11-kit0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661698" version="1" comment="p11-kit is &lt;0.23.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661795" version="1" comment="p11-kit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661699" version="1" comment="p11-kit-32bit is &lt;0.23.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661796" version="1" comment="p11-kit-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661700" version="1" comment="p11-kit-devel is &lt;0.23.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661797" version="1" comment="p11-kit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661701" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661798" version="1" comment="p11-kit-nss-trust is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661702" version="1" comment="p11-kit-nss-trust-32bit is &lt;0.23.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661799" version="1" comment="p11-kit-nss-trust-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661703" version="1" comment="p11-kit-tools is &lt;0.23.2-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661800" version="1" comment="p11-kit-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615771" version="1" comment="blosc-devel is &lt;1.20.1-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340461" version="1" comment="blosc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615772" version="1" comment="libblosc1 is &lt;1.20.1-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340463" version="1" comment="libblosc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612950" version="1" comment="gdk-pixbuf-devel is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151614" version="1" comment="gdk-pixbuf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612951" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.40.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153061" version="1" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612952" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151615" version="1" comment="gdk-pixbuf-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612953" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612954" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.40.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151617" version="1" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612955" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177170" version="1" comment="gdk-pixbuf-thumbnailer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612956" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612957" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.40.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151619" version="1" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612958" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612959" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.40.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342391" version="1" comment="typelib-1_0-GdkPixdata-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612573" version="1" comment="xen is &lt;4.13.2_06-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612574" version="1" comment="xen-devel is &lt;4.13.2_06-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612575" version="1" comment="xen-doc-html is &lt;4.13.2_06-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612576" version="1" comment="xen-libs is &lt;4.13.2_06-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612577" version="1" comment="xen-libs-32bit is &lt;4.13.2_06-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612578" version="1" comment="xen-tools is &lt;4.13.2_06-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612579" version="1" comment="xen-tools-domU is &lt;4.13.2_06-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612580" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_06-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615019" version="1" comment="python2-py is &lt;1.8.1-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477848" version="1" comment="python2-py is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615020" version="1" comment="python3-py is &lt;1.8.1-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477849" version="1" comment="python3-py is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626690" version="1" comment="icinga2 is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626691" version="1" comment="icinga2-bin is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626692" version="1" comment="icinga2-common is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626693" version="1" comment="icinga2-doc is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626694" version="1" comment="icinga2-ido-mysql is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626695" version="1" comment="icinga2-ido-pgsql is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626696" version="1" comment="nano-icinga2 is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626697" version="1" comment="vim-icinga2 is &lt;2.12.5-lp152.3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612949" version="1" comment="hawk2 is &lt;2.4.0+git.1611141202.2fe6369e-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341551" version="1" comment="hawk2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626679" version="1" comment="crmsh is &lt;4.3.1+20210702.4e0ee8fb-lp152.4.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341552" version="1" comment="crmsh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626680" version="1" comment="crmsh-scripts is &lt;4.3.1+20210702.4e0ee8fb-lp152.4.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341553" version="1" comment="crmsh-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626681" version="1" comment="crmsh-test is &lt;4.3.1+20210702.4e0ee8fb-lp152.4.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341554" version="1" comment="crmsh-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613859" version="1" comment="hawk2 is &lt;2.6.3+git.1614684118.af555ad9-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613162" version="1" comment="libopenvswitch-2_13-0 is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613163" version="1" comment="libovn-20_03-0 is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613164" version="1" comment="openvswitch is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613165" version="1" comment="openvswitch-devel is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613166" version="1" comment="openvswitch-doc is &lt;2.13.2-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613167" version="1" comment="openvswitch-ipsec is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613168" version="1" comment="openvswitch-pki is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613169" version="1" comment="openvswitch-test is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613170" version="1" comment="openvswitch-vtep is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613171" version="1" comment="ovn is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613172" version="1" comment="ovn-central is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613173" version="1" comment="ovn-devel is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613174" version="1" comment="ovn-doc is &lt;20.03.1-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613175" version="1" comment="ovn-docker is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613176" version="1" comment="ovn-host is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613177" version="1" comment="ovn-vtep is &lt;20.03.1-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613178" version="1" comment="python3-ovs is &lt;2.13.2-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631922" version="1" comment="qemu is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631923" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631924" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631925" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631926" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631927" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631928" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631929" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631930" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631931" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631932" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631933" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631934" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631935" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631936" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631937" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631938" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631939" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631940" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631941" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631942" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631943" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631944" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631945" version="1" comment="qemu-sgabios is &lt;8-lp152.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631946" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631947" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631948" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631949" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631950" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631951" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631952" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631953" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631954" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625505" version="1" comment="dbus-1 is &lt;1.12.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625506" version="1" comment="dbus-1-devel is &lt;1.12.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625507" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625508" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-lp152.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625509" version="1" comment="dbus-1-x11 is &lt;1.12.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625510" version="1" comment="libdbus-1-3 is &lt;1.12.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625511" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-lp152.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613713" version="1" comment="389-ds is &lt;1.4.3.19~git0.bef0b5bed-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168666" version="1" comment="389-ds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613714" version="1" comment="389-ds-devel is &lt;1.4.3.19~git0.bef0b5bed-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168668" version="1" comment="389-ds-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613715" version="1" comment="389-ds-snmp is &lt;1.4.3.19~git0.bef0b5bed-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253606" version="1" comment="389-ds-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613716" version="1" comment="lib389 is &lt;1.4.3.19~git0.bef0b5bed-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347740" version="1" comment="lib389 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613717" version="1" comment="libsvrcore0 is &lt;1.4.3.19~git0.bef0b5bed-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347741" version="1" comment="libsvrcore0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614473" version="1" comment="postsrsd is &lt;1.11-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353385" version="1" comment="postsrsd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613078" version="1" comment="kitty is &lt;0.16.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340871" version="1" comment="kitty is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612960" version="1" comment="python2-autobahn is &lt;17.10.1-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342290" version="1" comment="python2-autobahn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612961" version="1" comment="python3-autobahn is &lt;17.10.1-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342291" version="1" comment="python3-autobahn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615773" version="1" comment="cacti is &lt;1.2.17-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615774" version="1" comment="cacti-spine is &lt;1.2.17-lp152.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661848" version="1" comment="aom-tools is &lt;1.0.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261711" version="1" comment="aom-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661849" version="1" comment="libaom-devel is &lt;1.0.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261713" version="1" comment="libaom-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661850" version="1" comment="libaom-devel-doc is &lt;1.0.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261714" version="1" comment="libaom-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661851" version="1" comment="libaom0 is &lt;1.0.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261715" version="1" comment="libaom0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661852" version="1" comment="libaom0-32bit is &lt;1.0.0-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632651" version="1" comment="libaom0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632901" version="1" comment="php7-pear is &lt;1.10.21-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154176" version="1" comment="php7-pear is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632902" version="1" comment="php7-pecl is &lt;1.10.21-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632740" version="1" comment="php7-pecl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613675" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613676" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613677" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613678" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613679" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613680" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613681" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613682" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613683" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613684" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613685" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613686" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613687" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613688" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613689" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613609" version="1" comment="gnome-autoar-devel is &lt;0.2.3-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346923" version="1" comment="gnome-autoar-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613610" version="1" comment="libgnome-autoar-0-0 is &lt;0.2.3-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346924" version="1" comment="libgnome-autoar-0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613611" version="1" comment="libgnome-autoar-gtk-0-0 is &lt;0.2.3-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346925" version="1" comment="libgnome-autoar-gtk-0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613612" version="1" comment="typelib-1_0-GnomeAutoar-0_1 is &lt;0.2.3-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346926" version="1" comment="typelib-1_0-GnomeAutoar-0_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613613" version="1" comment="typelib-1_0-GnomeAutoarGtk-0_1 is &lt;0.2.3-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346927" version="1" comment="typelib-1_0-GnomeAutoarGtk-0_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613416" version="1" comment="python2-cryptography is &lt;2.8-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613417" version="1" comment="python3-cryptography is &lt;2.8-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631552" version="1" comment="bgzip is &lt;1.10.2-lp152.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631553" version="1" comment="bgzip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631554" version="1" comment="htsfile is &lt;1.10.2-lp152.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631555" version="1" comment="htsfile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631556" version="1" comment="libhts-devel is &lt;1.10.2-lp152.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631557" version="1" comment="libhts-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631558" version="1" comment="libhts3 is &lt;1.10.2-lp152.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631559" version="1" comment="libhts3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631560" version="1" comment="tabix is &lt;1.10.2-lp152.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631561" version="1" comment="tabix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631506" version="1" comment="libass-devel is &lt;0.14.0-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631507" version="1" comment="libass9 is &lt;0.14.0-lp152.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631508" version="1" comment="libass9-32bit is &lt;0.14.0-lp152.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652561" version="1" comment="kernel-debug is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652562" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652563" version="1" comment="kernel-default is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652564" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.95.1.lp152.8.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652565" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.95.1.lp152.8.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652566" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652567" version="1" comment="kernel-devel is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652568" version="1" comment="kernel-docs is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652569" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652570" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652571" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652572" version="1" comment="kernel-macros is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652573" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652574" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652575" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652576" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652577" version="1" comment="kernel-source is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652578" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652579" version="1" comment="kernel-syms is &lt;5.3.18-lp152.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652631" version="1" comment="kmod is &lt;25-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652726" version="1" comment="kmod is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652632" version="1" comment="kmod-bash-completion is &lt;25-lp152.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652727" version="1" comment="kmod-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652633" version="1" comment="kmod-compat is &lt;25-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652586" version="1" comment="kmod-compat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652634" version="1" comment="libkmod-devel is &lt;25-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652728" version="1" comment="libkmod-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652635" version="1" comment="libkmod2 is &lt;25-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652729" version="1" comment="libkmod2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610352" version="1" comment="libpainter0 is &lt;0.9.13.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287510" version="1" comment="libpainter0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610353" version="1" comment="librfxencode0 is &lt;0.9.13.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287511" version="1" comment="librfxencode0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610354" version="1" comment="xrdp is &lt;0.9.13.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287512" version="1" comment="xrdp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610355" version="1" comment="xrdp-devel is &lt;0.9.13.1-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287513" version="1" comment="xrdp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612737" version="1" comment="coturn is &lt;4.5.1.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291480" version="1" comment="coturn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612738" version="1" comment="coturn-devel is &lt;4.5.1.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291481" version="1" comment="coturn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612739" version="1" comment="coturn-utils is &lt;4.5.1.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291482" version="1" comment="coturn-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612925" version="1" comment="viewvc is &lt;1.1.28-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151738" version="1" comment="viewvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611673" version="1" comment="atftp is &lt;0.7.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296746" version="1" comment="atftp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612717" version="1" comment="opera is &lt;68.0.3618.104-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612687" version="1" comment="chromedriver is &lt;83.0.4103.116-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612688" version="1" comment="chromium is &lt;83.0.4103.116-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612774" version="1" comment="opera is &lt;69.0.3686.49-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609999" version="1" comment="chromedriver is &lt;84.0.4147.89-lp152.2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610000" version="1" comment="chromium is &lt;84.0.4147.89-lp152.2.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610302" version="1" comment="opera is &lt;70.0.3728.71-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604512" version="1" comment="chromedriver is &lt;84.0.4147.105-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604513" version="1" comment="chromium is &lt;84.0.4147.105-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610937" version="1" comment="opera is &lt;70.0.3728.133-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604617" version="1" comment="chromedriver is &lt;84.0.4147.125-lp152.2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604618" version="1" comment="chromium is &lt;84.0.4147.125-lp152.2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610684" version="1" comment="chromedriver is &lt;84.0.4147.135-lp152.2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610685" version="1" comment="chromium is &lt;84.0.4147.135-lp152.2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614157" version="1" comment="python2-bleach is &lt;3.1.5-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279500" version="1" comment="python2-bleach is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614158" version="1" comment="python3-bleach is &lt;3.1.5-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279501" version="1" comment="python3-bleach is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610947" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154143" version="1" comment="apache2-mod_php7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610948" version="1" comment="php7 is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154144" version="1" comment="php7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610949" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154145" version="1" comment="php7-bcmath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610950" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154146" version="1" comment="php7-bz2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610951" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154147" version="1" comment="php7-calendar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610952" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154148" version="1" comment="php7-ctype is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610953" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154149" version="1" comment="php7-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610954" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154150" version="1" comment="php7-dba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610955" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154151" version="1" comment="php7-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610956" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154152" version="1" comment="php7-dom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610957" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230509" version="1" comment="php7-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610958" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154153" version="1" comment="php7-enchant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610959" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154154" version="1" comment="php7-exif is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610960" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154155" version="1" comment="php7-fastcgi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610961" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154156" version="1" comment="php7-fileinfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610962" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154157" version="1" comment="php7-firebird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610963" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154158" version="1" comment="php7-fpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610964" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154159" version="1" comment="php7-ftp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610965" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154160" version="1" comment="php7-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610966" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154161" version="1" comment="php7-gettext is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610967" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154162" version="1" comment="php7-gmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610968" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154163" version="1" comment="php7-iconv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610969" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154165" version="1" comment="php7-intl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610970" version="1" comment="php7-json is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154166" version="1" comment="php7-json is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610971" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154167" version="1" comment="php7-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610972" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154168" version="1" comment="php7-mbstring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610973" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154170" version="1" comment="php7-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610974" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154171" version="1" comment="php7-odbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610975" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154172" version="1" comment="php7-opcache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610976" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154173" version="1" comment="php7-openssl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610977" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154174" version="1" comment="php7-pcntl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610978" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154175" version="1" comment="php7-pdo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610979" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154178" version="1" comment="php7-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610980" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154179" version="1" comment="php7-phar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610981" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154180" version="1" comment="php7-posix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610982" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154182" version="1" comment="php7-readline is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610983" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154183" version="1" comment="php7-shmop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610984" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154184" version="1" comment="php7-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610985" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154185" version="1" comment="php7-soap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610986" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154186" version="1" comment="php7-sockets is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610987" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230510" version="1" comment="php7-sodium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610988" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154187" version="1" comment="php7-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610989" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154188" version="1" comment="php7-sysvmsg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610990" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154189" version="1" comment="php7-sysvsem is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610991" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154190" version="1" comment="php7-sysvshm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610992" version="1" comment="php7-test is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270016" version="1" comment="php7-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610993" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154191" version="1" comment="php7-tidy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610994" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154192" version="1" comment="php7-tokenizer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610995" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154194" version="1" comment="php7-xmlreader is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610996" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154195" version="1" comment="php7-xmlrpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610997" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154196" version="1" comment="php7-xmlwriter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610998" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154197" version="1" comment="php7-xsl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610999" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154198" version="1" comment="php7-zip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611000" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154199" version="1" comment="php7-zlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611612" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611613" version="1" comment="php7 is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611614" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611615" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611616" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611617" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611618" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611619" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611620" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611621" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611622" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611623" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611624" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611625" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611626" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611627" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611628" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611629" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611630" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611631" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611632" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611633" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611634" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611635" version="1" comment="php7-json is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611636" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611637" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611638" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611639" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611640" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611641" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611642" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611643" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611644" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611645" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611646" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611647" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611648" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611649" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611650" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611651" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611652" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611653" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611654" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611655" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611656" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611657" version="1" comment="php7-test is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611658" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611659" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611660" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611661" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611662" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611663" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611664" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611665" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612828" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612829" version="1" comment="php7 is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612830" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612831" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612832" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612833" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612834" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612835" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612836" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612837" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612838" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612839" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612840" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612841" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612842" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612843" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612844" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612845" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612846" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612847" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612848" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612849" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612850" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612851" version="1" comment="php7-json is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612852" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612853" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612854" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612855" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612856" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612857" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612858" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612859" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612860" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612861" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612862" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612863" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612864" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612865" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612866" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612867" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612868" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612869" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612870" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612871" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612872" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612873" version="1" comment="php7-test is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612874" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612875" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612876" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612877" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612878" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612879" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612880" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612881" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625528" version="1" comment="nodejs10 is &lt;10.24.1-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625529" version="1" comment="nodejs10-devel is &lt;10.24.1-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625530" version="1" comment="nodejs10-docs is &lt;10.24.1-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625520" version="1" comment="nodejs12 is &lt;12.22.2-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625521" version="1" comment="nodejs12-devel is &lt;12.22.2-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625522" version="1" comment="nodejs12-docs is &lt;12.22.2-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625524" version="1" comment="nodejs14 is &lt;14.17.2-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341817" version="1" comment="nodejs14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625525" version="1" comment="nodejs14-devel is &lt;14.17.2-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341818" version="1" comment="nodejs14-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625526" version="1" comment="nodejs14-docs is &lt;14.17.2-lp152.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341819" version="1" comment="nodejs14-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629528" version="1" comment="nodejs8 is &lt;8.17.0-lp152.3.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230278" version="1" comment="nodejs8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629529" version="1" comment="nodejs8-devel is &lt;8.17.0-lp152.3.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230279" version="1" comment="nodejs8-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629530" version="1" comment="nodejs8-docs is &lt;8.17.0-lp152.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230280" version="1" comment="nodejs8-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625531" version="1" comment="npm10 is &lt;10.24.1-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625523" version="1" comment="npm12 is &lt;12.22.2-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625527" version="1" comment="npm14 is &lt;14.17.2-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341820" version="1" comment="npm14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629531" version="1" comment="npm8 is &lt;8.17.0-lp152.3.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230281" version="1" comment="npm8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612792" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612793" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612794" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612795" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612796" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612797" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612798" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612799" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612800" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612801" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612802" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612803" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612804" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612805" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612806" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615775" version="1" comment="hylafax+ is &lt;7.0.3-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615776" version="1" comment="hylafax+-client is &lt;7.0.3-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615777" version="1" comment="libfaxutil7_0_3 is &lt;7.0.3-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610700" version="1" comment="inn is &lt;2.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278741" version="1" comment="inn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610701" version="1" comment="inn-devel is &lt;2.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278742" version="1" comment="inn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610702" version="1" comment="mininews is &lt;2.6.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278743" version="1" comment="mininews is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611285" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611286" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp152.14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611287" version="1" comment="libldap-data is &lt;2.4.46-lp152.14.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611288" version="1" comment="openldap2 is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611289" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611290" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611291" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611292" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611293" version="1" comment="openldap2-client is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611294" version="1" comment="openldap2-contrib is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611295" version="1" comment="openldap2-devel is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611296" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp152.14.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611297" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611298" version="1" comment="openldap2-doc is &lt;2.4.46-lp152.14.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611299" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp152.14.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612056" version="1" comment="tcpdump is &lt;4.9.2-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152520" version="1" comment="tcpdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615778" version="1" comment="nextcloud is &lt;20.0.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164979" version="1" comment="nextcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611283" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253149" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611284" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253150" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611496" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is &lt;5.1.4-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295961" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611497" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is &lt;5.1.4-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295962" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612676" version="1" comment="curl is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612677" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223333" version="1" comment="curl-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612678" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151178" version="1" comment="libcurl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612679" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153284" version="1" comment="libcurl-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612680" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223334" version="1" comment="libcurl-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612681" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612682" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153285" version="1" comment="libcurl4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612683" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223335" version="1" comment="libcurl4-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611166" version="1" comment="curl is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611167" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611168" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611169" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611170" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611171" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611172" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611173" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614484" version="1" comment="nodejs14 is &lt;14.15.4-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614485" version="1" comment="nodejs14-devel is &lt;14.15.4-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614486" version="1" comment="nodejs14-docs is &lt;14.15.4-lp152.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614487" version="1" comment="npm14 is &lt;14.15.4-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612235" version="1" comment="c-ares-devel is &lt;1.17.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300208" version="1" comment="c-ares-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612236" version="1" comment="c-ares-utils is &lt;1.17.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300210" version="1" comment="c-ares-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612237" version="1" comment="libcares2 is &lt;1.17.0-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612238" version="1" comment="libcares2-32bit is &lt;1.17.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153707" version="1" comment="libcares2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612440" version="1" comment="curl is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612441" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612442" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612443" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612444" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612445" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612446" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612447" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612994" version="1" comment="nodejs8 is &lt;8.17.0-lp152.3.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612995" version="1" comment="nodejs8-devel is &lt;8.17.0-lp152.3.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612996" version="1" comment="nodejs8-docs is &lt;8.17.0-lp152.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612997" version="1" comment="npm8 is &lt;8.17.0-lp152.3.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625866" version="1" comment="nextcloud is &lt;20.0.11-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625867" version="1" comment="nextcloud-apache is &lt;20.0.11-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342908" version="1" comment="nextcloud-apache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613523" version="1" comment="bind is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613524" version="1" comment="bind-chrootenv is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613525" version="1" comment="bind-devel is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613526" version="1" comment="bind-devel-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613527" version="1" comment="bind-doc is &lt;9.16.6-lp152.14.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613528" version="1" comment="bind-utils is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613529" version="1" comment="libbind9-1600 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613530" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613531" version="1" comment="libdns1605 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613532" version="1" comment="libdns1605-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613533" version="1" comment="libirs-devel is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613534" version="1" comment="libirs1601 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613535" version="1" comment="libirs1601-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613536" version="1" comment="libisc1606 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613537" version="1" comment="libisc1606-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613538" version="1" comment="libisccc1600 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613539" version="1" comment="libisccc1600-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613540" version="1" comment="libisccfg1600 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613541" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613542" version="1" comment="libns1604 is &lt;9.16.6-lp152.14.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613543" version="1" comment="libns1604-32bit is &lt;9.16.6-lp152.14.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613544" version="1" comment="python3-bind is &lt;9.16.6-lp152.14.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612175" version="1" comment="ucode-intel is &lt;20201118-lp152.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609989" version="1" comment="google-compute-engine-init is &lt;20190801-lp152.5.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287516" version="1" comment="google-compute-engine-init is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609990" version="1" comment="google-compute-engine-oslogin is &lt;20190801-lp152.5.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287517" version="1" comment="google-compute-engine-oslogin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609991" version="1" comment="google-compute-engine-oslogin-32bit is &lt;20190801-lp152.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287518" version="1" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611395" version="1" comment="brotli is &lt;1.0.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294770" version="1" comment="brotli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611396" version="1" comment="libbrotli-devel is &lt;1.0.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294771" version="1" comment="libbrotli-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611397" version="1" comment="libbrotlicommon1 is &lt;1.0.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294772" version="1" comment="libbrotlicommon1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611398" version="1" comment="libbrotlicommon1-32bit is &lt;1.0.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294773" version="1" comment="libbrotlicommon1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611399" version="1" comment="libbrotlidec1 is &lt;1.0.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294774" version="1" comment="libbrotlidec1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611400" version="1" comment="libbrotlidec1-32bit is &lt;1.0.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294775" version="1" comment="libbrotlidec1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611401" version="1" comment="libbrotlienc1 is &lt;1.0.9-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294776" version="1" comment="libbrotlienc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009611402" version="1" comment="libbrotlienc1-32bit is &lt;1.0.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294777" version="1" comment="libbrotlienc1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610703" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610704" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.28.4-lp152.2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610705" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610706" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.28.4-lp152.2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610707" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-lp152.2.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610708" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610709" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610710" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610711" version="1" comment="webkit-jsc-4 is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610712" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610713" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009610714" version="1" comment="webkit2gtk3-minibrowser is &lt;2.28.4-lp152.2.4.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632609" version="1" comment="xen is &lt;4.13.3_02-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632610" version="1" comment="xen-devel is &lt;4.13.3_02-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632611" version="1" comment="xen-doc-html is &lt;4.13.3_02-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632612" version="1" comment="xen-libs is &lt;4.13.3_02-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632613" version="1" comment="xen-libs-32bit is &lt;4.13.3_02-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632614" version="1" comment="xen-tools is &lt;4.13.3_02-lp152.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632615" version="1" comment="xen-tools-domU is &lt;4.13.3_02-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632616" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.3_02-lp152.2.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613179" version="1" comment="wpa_supplicant is &lt;2.9-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613180" version="1" comment="wpa_supplicant-gui is &lt;2.9-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657894" version="1" comment="kernel-debug is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657895" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657896" version="1" comment="kernel-default is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657897" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.106.1.lp152.8.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657898" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.106.1.lp152.8.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657899" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657900" version="1" comment="kernel-devel is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657901" version="1" comment="kernel-docs is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657902" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657903" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657904" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657905" version="1" comment="kernel-macros is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657906" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657907" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657908" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657909" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657910" version="1" comment="kernel-source is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657911" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657912" version="1" comment="kernel-syms is &lt;5.3.18-lp152.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614168" version="1" comment="clamav is &lt;0.103.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614169" version="1" comment="clamav-devel is &lt;0.103.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614170" version="1" comment="libclamav9 is &lt;0.103.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614171" version="1" comment="libfreshclam2 is &lt;0.103.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659764" version="1" comment="ImageMagick is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659765" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659766" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659767" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659768" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp152.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659769" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp152.12.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659770" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659771" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659772" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp152.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659773" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659774" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp152.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659775" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659776" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659777" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659778" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659779" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp152.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613931" version="1" comment="tar is &lt;1.30-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613932" version="1" comment="tar-backup-scripts is &lt;1.30-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153774" version="1" comment="tar-backup-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613933" version="1" comment="tar-doc is &lt;1.30-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251575" version="1" comment="tar-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613934" version="1" comment="tar-lang is &lt;1.30-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151392" version="1" comment="tar-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613935" version="1" comment="tar-rmt is &lt;1.30-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177166" version="1" comment="tar-rmt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613936" version="1" comment="tar-tests is &lt;1.30-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153775" version="1" comment="tar-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615066" version="1" comment="libspice-server-devel is &lt;0.14.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615067" version="1" comment="libspice-server1 is &lt;0.14.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662394" version="1" comment="getdata is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662405" version="1" comment="getdata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662395" version="1" comment="getdata-devel is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662406" version="1" comment="getdata-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662396" version="1" comment="getdata-doc is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662407" version="1" comment="getdata-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662397" version="1" comment="libf95getdata7 is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662408" version="1" comment="libf95getdata7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662398" version="1" comment="libfgetdata6 is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662409" version="1" comment="libfgetdata6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662399" version="1" comment="libgetdata++7 is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662410" version="1" comment="libgetdata++7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662400" version="1" comment="libgetdata8 is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662411" version="1" comment="libgetdata8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662401" version="1" comment="perl-getdata is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662412" version="1" comment="perl-getdata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662402" version="1" comment="python-getdata is &lt;0.11.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662413" version="1" comment="python-getdata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613108" version="1" comment="privoxy is &lt;3.0.31-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152636" version="1" comment="privoxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613109" version="1" comment="privoxy-doc is &lt;3.0.31-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153606" version="1" comment="privoxy-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613690" version="1" comment="stunnel is &lt;5.57-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347478" version="1" comment="stunnel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613691" version="1" comment="stunnel-doc is &lt;5.57-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347479" version="1" comment="stunnel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613837" version="1" comment="gnutls is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613838" version="1" comment="gnutls-guile is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613839" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613840" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613841" version="1" comment="libgnutls-devel is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613842" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613843" version="1" comment="libgnutls30 is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613844" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613845" version="1" comment="libgnutls30-hmac is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613846" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613847" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613848" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613557" version="1" comment="ImageMagick is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613558" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613559" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613560" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613561" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp152.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613562" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp152.12.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613563" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613564" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613565" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp152.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613566" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613567" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp152.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613568" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613569" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613570" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613571" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613572" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp152.12.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613974" version="1" comment="isync is &lt;1.3.5-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350656" version="1" comment="isync is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652636" version="1" comment="python2-rpm is &lt;4.14.1-lp152.18.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231455" version="1" comment="python2-rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652637" version="1" comment="python3-rpm is &lt;4.14.1-lp152.18.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231456" version="1" comment="python3-rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652638" version="1" comment="rpm is &lt;4.14.1-lp152.18.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151943" version="1" comment="rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652639" version="1" comment="rpm-32bit is &lt;4.14.1-lp152.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151944" version="1" comment="rpm-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652640" version="1" comment="rpm-build is &lt;4.14.1-lp152.18.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151945" version="1" comment="rpm-build is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652641" version="1" comment="rpm-devel is &lt;4.14.1-lp152.18.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151946" version="1" comment="rpm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653785" version="1" comment="python3-Pygments is &lt;2.6.1-lp152.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350179" version="1" comment="python3-Pygments is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613795" version="1" comment="privoxy is &lt;3.0.32-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613796" version="1" comment="privoxy-doc is &lt;3.0.32-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614517" version="1" comment="ceph is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614518" version="1" comment="ceph-base is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614519" version="1" comment="ceph-common is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614520" version="1" comment="ceph-fuse is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614521" version="1" comment="ceph-grafana-dashboards is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614522" version="1" comment="ceph-immutable-object-cache is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614523" version="1" comment="ceph-mds is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614524" version="1" comment="ceph-mgr is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614525" version="1" comment="ceph-mgr-cephadm is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614526" version="1" comment="ceph-mgr-dashboard is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614527" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614528" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614529" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614530" version="1" comment="ceph-mgr-modules-core is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614531" version="1" comment="ceph-mgr-rook is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614532" version="1" comment="ceph-mon is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614533" version="1" comment="ceph-osd is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614534" version="1" comment="ceph-prometheus-alerts is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614535" version="1" comment="ceph-radosgw is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614536" version="1" comment="ceph-test is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614537" version="1" comment="cephadm is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614538" version="1" comment="cephfs-shell is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614539" version="1" comment="libcephfs-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614540" version="1" comment="libcephfs2 is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614541" version="1" comment="librados-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614542" version="1" comment="librados2 is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614543" version="1" comment="libradospp-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614544" version="1" comment="librbd-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614545" version="1" comment="librbd1 is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614546" version="1" comment="librgw-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614547" version="1" comment="librgw2 is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614548" version="1" comment="python3-ceph-argparse is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614549" version="1" comment="python3-ceph-common is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614550" version="1" comment="python3-cephfs is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614551" version="1" comment="python3-rados is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614552" version="1" comment="python3-rbd is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614553" version="1" comment="python3-rgw is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614554" version="1" comment="rados-objclass-devel is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614555" version="1" comment="rbd-fuse is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614556" version="1" comment="rbd-mirror is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614557" version="1" comment="rbd-nbd is &lt;15.2.11.83+g8a15f484c2-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614510" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614511" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614512" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614513" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614514" version="1" comment="openexr is &lt;2.2.1-lp152.7.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614515" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614516" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631848" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631849" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631850" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631851" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631852" version="1" comment="openexr is &lt;2.2.1-lp152.7.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631853" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631854" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614347" version="1" comment="libhogweed4 is &lt;3.4.1-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177221" version="1" comment="libhogweed4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614348" version="1" comment="libhogweed4-32bit is &lt;3.4.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242425" version="1" comment="libhogweed4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614349" version="1" comment="libnettle-devel is &lt;3.4.1-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153225" version="1" comment="libnettle-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614350" version="1" comment="libnettle-devel-32bit is &lt;3.4.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153226" version="1" comment="libnettle-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614351" version="1" comment="libnettle6 is &lt;3.4.1-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177222" version="1" comment="libnettle6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614352" version="1" comment="libnettle6-32bit is &lt;3.4.1-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242426" version="1" comment="libnettle6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614353" version="1" comment="nettle is &lt;3.4.1-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153229" version="1" comment="nettle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615083" version="1" comment="htmldoc is &lt;1.9.12-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151341" version="1" comment="htmldoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614285" version="1" comment="ImageMagick is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614286" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614287" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614288" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614289" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp152.12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614290" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp152.12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614291" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614292" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614293" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp152.12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614294" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614295" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp152.12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614296" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614297" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614298" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614299" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp152.12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614300" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp152.12.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631864" version="1" comment="libspf2-2 is &lt;1.2.10-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631797" version="1" comment="libspf2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631865" version="1" comment="libspf2-devel is &lt;1.2.10-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631798" version="1" comment="libspf2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631866" version="1" comment="libspf2-tools is &lt;1.2.10-lp152.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631799" version="1" comment="libspf2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614322" version="1" comment="python3-virtualbox is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614323" version="1" comment="virtualbox is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614324" version="1" comment="virtualbox-devel is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614325" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.20-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614326" version="1" comment="virtualbox-guest-source is &lt;6.1.20-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614327" version="1" comment="virtualbox-guest-tools is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614328" version="1" comment="virtualbox-guest-x11 is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614329" version="1" comment="virtualbox-host-source is &lt;6.1.20-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614330" version="1" comment="virtualbox-kmp-default is &lt;6.1.20_k5.3.18_lp152.72-lp152.2.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614331" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.20_k5.3.18_lp152.72-lp152.2.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614332" version="1" comment="virtualbox-qt is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614333" version="1" comment="virtualbox-vnc is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614334" version="1" comment="virtualbox-websrv is &lt;6.1.20-lp152.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613095" version="1" comment="chromedriver is &lt;88.0.4324.146-lp152.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613096" version="1" comment="chromium is &lt;88.0.4324.146-lp152.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613110" version="1" comment="chromedriver is &lt;88.0.4324.150-lp152.2.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613111" version="1" comment="chromium is &lt;88.0.4324.150-lp152.2.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613695" version="1" comment="opera is &lt;74.0.3911.203-lp152.2.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613793" version="1" comment="chromedriver is &lt;89.0.4389.90-lp152.2.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613794" version="1" comment="chromium is &lt;89.0.4389.90-lp152.2.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614226" version="1" comment="opera is &lt;75.0.3969.171-lp152.2.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613964" version="1" comment="chromedriver is &lt;89.0.4389.114-lp152.2.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613965" version="1" comment="chromium is &lt;89.0.4389.114-lp152.2.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614320" version="1" comment="chromedriver is &lt;90.0.4430.93-lp152.2.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614321" version="1" comment="chromium is &lt;90.0.4430.93-lp152.2.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614182" version="1" comment="chromedriver is &lt;89.0.4389.128-lp152.2.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614183" version="1" comment="chromium is &lt;89.0.4389.128-lp152.2.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614618" version="1" comment="opera is &lt;76.0.4017.94-lp152.2.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614932" version="1" comment="chromedriver is &lt;91.0.4472.77-lp152.2.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614933" version="1" comment="chromium is &lt;91.0.4472.77-lp152.2.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614667" version="1" comment="opera is &lt;76.0.4017.107-lp152.2.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613976" version="1" comment="flatpak is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171006" version="1" comment="flatpak is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613977" version="1" comment="flatpak-devel is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171008" version="1" comment="flatpak-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613978" version="1" comment="flatpak-zsh-completion is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350833" version="1" comment="flatpak-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613979" version="1" comment="libflatpak0 is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171009" version="1" comment="libflatpak0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613980" version="1" comment="libostree is &lt;2020.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350834" version="1" comment="libostree is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613981" version="1" comment="libostree-1-1 is &lt;2020.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350835" version="1" comment="libostree-1-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613982" version="1" comment="libostree-devel is &lt;2020.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350836" version="1" comment="libostree-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613983" version="1" comment="libostree-grub2 is &lt;2020.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350837" version="1" comment="libostree-grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613984" version="1" comment="system-user-flatpak is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350838" version="1" comment="system-user-flatpak is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613985" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.2-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171010" version="1" comment="typelib-1_0-Flatpak-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613986" version="1" comment="typelib-1_0-OSTree-1_0 is &lt;2020.8-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350839" version="1" comment="typelib-1_0-OSTree-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613987" version="1" comment="xdg-desktop-portal is &lt;1.8.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350840" version="1" comment="xdg-desktop-portal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613988" version="1" comment="xdg-desktop-portal-devel is &lt;1.8.0-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350841" version="1" comment="xdg-desktop-portal-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613989" version="1" comment="xdg-desktop-portal-gtk is &lt;1.8.0-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350842" version="1" comment="xdg-desktop-portal-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613990" version="1" comment="xdg-desktop-portal-gtk-lang is &lt;1.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350843" version="1" comment="xdg-desktop-portal-gtk-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613991" version="1" comment="xdg-desktop-portal-lang is &lt;1.8.0-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350844" version="1" comment="xdg-desktop-portal-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615073" version="1" comment="containerd is &lt;1.4.4-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615074" version="1" comment="containerd-ctr is &lt;1.4.4-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615075" version="1" comment="docker is &lt;20.10.6_ce-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615076" version="1" comment="docker-bash-completion is &lt;20.10.6_ce-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615077" version="1" comment="docker-fish-completion is &lt;20.10.6_ce-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615078" version="1" comment="docker-zsh-completion is &lt;20.10.6_ce-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615079" version="1" comment="runc is &lt;1.0.0~rc93-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613803" version="1" comment="netty is &lt;4.1.13-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347974" version="1" comment="netty is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613804" version="1" comment="netty-javadoc is &lt;4.1.13-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347975" version="1" comment="netty-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613805" version="1" comment="netty-poms is &lt;4.1.13-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347976" version="1" comment="netty-poms is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613639" version="1" comment="git is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151600" version="1" comment="git is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613640" version="1" comment="git-arch is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153608" version="1" comment="git-arch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613641" version="1" comment="git-core is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151601" version="1" comment="git-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613642" version="1" comment="git-credential-gnome-keyring is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153609" version="1" comment="git-credential-gnome-keyring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613643" version="1" comment="git-credential-libsecret is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178167" version="1" comment="git-credential-libsecret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613644" version="1" comment="git-cvs is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151602" version="1" comment="git-cvs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613645" version="1" comment="git-daemon is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151603" version="1" comment="git-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613646" version="1" comment="git-doc is &lt;2.26.2-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153610" version="1" comment="git-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613647" version="1" comment="git-email is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151604" version="1" comment="git-email is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613648" version="1" comment="git-gui is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151605" version="1" comment="git-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613649" version="1" comment="git-p4 is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178168" version="1" comment="git-p4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613650" version="1" comment="git-svn is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151606" version="1" comment="git-svn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613651" version="1" comment="git-web is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151607" version="1" comment="git-web is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613652" version="1" comment="gitk is &lt;2.26.2-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151608" version="1" comment="gitk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614564" version="1" comment="redis is &lt;6.0.13-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152049" version="1" comment="redis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614938" version="1" comment="xstream is &lt;1.4.16-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614939" version="1" comment="xstream-benchmark is &lt;1.4.16-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614940" version="1" comment="xstream-javadoc is &lt;1.4.16-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614941" version="1" comment="xstream-parent is &lt;1.4.16-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614308" version="1" comment="nim is &lt;1.2.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351816" version="1" comment="nim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614568" version="1" comment="syncthing is &lt;1.15.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169708" version="1" comment="syncthing is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614569" version="1" comment="syncthing-relaysrv is &lt;1.15.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474282" version="1" comment="syncthing-relaysrv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614217" version="1" comment="python3-django-registration is &lt;3.1.2-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351450" version="1" comment="python3-django-registration is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614652" version="1" comment="python3-virtualbox is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614653" version="1" comment="virtualbox is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614654" version="1" comment="virtualbox-devel is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614655" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.22-lp152.2.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614656" version="1" comment="virtualbox-guest-source is &lt;6.1.22-lp152.2.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614657" version="1" comment="virtualbox-guest-tools is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614658" version="1" comment="virtualbox-guest-x11 is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614659" version="1" comment="virtualbox-host-source is &lt;6.1.22-lp152.2.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614660" version="1" comment="virtualbox-kmp-default is &lt;6.1.22_k5.3.18_lp152.75-lp152.2.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614661" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.22_k5.3.18_lp152.75-lp152.2.24.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614662" version="1" comment="virtualbox-qt is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614663" version="1" comment="virtualbox-vnc is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614664" version="1" comment="virtualbox-websrv is &lt;6.1.22-lp152.2.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614644" version="1" comment="java-11-openjdk is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614645" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614646" version="1" comment="java-11-openjdk-demo is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614647" version="1" comment="java-11-openjdk-devel is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614648" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614649" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.11.0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614650" version="1" comment="java-11-openjdk-jmods is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614651" version="1" comment="java-11-openjdk-src is &lt;11.0.11.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654250" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654251" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654252" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654253" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654254" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654255" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.312-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654256" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.312-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631509" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631510" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631511" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631512" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631513" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631514" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.302-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631515" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.302-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615864" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615865" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615866" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615867" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615868" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615869" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.292-lp152.2.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615870" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.292-lp152.2.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613193" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613194" version="1" comment="php7 is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613195" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613196" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613197" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613198" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613199" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613200" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613201" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613202" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613203" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613204" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613205" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613206" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613207" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613208" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613209" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613210" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613211" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613212" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613213" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613214" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613215" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613216" version="1" comment="php7-json is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613217" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613218" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613219" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613220" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613221" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613222" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613223" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613224" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613225" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613226" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613227" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613228" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613229" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613230" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613231" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613232" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613233" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613234" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613235" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613236" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613237" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613238" version="1" comment="php7-test is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613239" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613240" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613241" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613242" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613243" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613244" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613245" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613246" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659522" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659523" version="1" comment="php7 is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659524" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659525" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659526" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659527" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659528" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659529" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659530" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659531" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659532" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659533" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659534" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659535" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659536" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659537" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659538" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659539" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659540" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659541" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659542" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659543" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659544" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659545" version="1" comment="php7-json is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659546" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659547" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659548" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659549" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659550" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659551" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659552" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659553" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659554" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659555" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659556" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659557" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659558" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659559" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659560" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659561" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659562" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659563" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659564" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659565" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659566" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659567" version="1" comment="php7-test is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659568" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659569" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659570" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659571" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659572" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659573" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659574" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659575" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630468" version="1" comment="apache2-mod_php7 is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630469" version="1" comment="php7 is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630470" version="1" comment="php7-bcmath is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630471" version="1" comment="php7-bz2 is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630472" version="1" comment="php7-calendar is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630473" version="1" comment="php7-ctype is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630474" version="1" comment="php7-curl is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630475" version="1" comment="php7-dba is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630476" version="1" comment="php7-devel is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630477" version="1" comment="php7-dom is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630478" version="1" comment="php7-embed is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630479" version="1" comment="php7-enchant is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630480" version="1" comment="php7-exif is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630481" version="1" comment="php7-fastcgi is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630482" version="1" comment="php7-fileinfo is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630483" version="1" comment="php7-firebird is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630484" version="1" comment="php7-fpm is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630485" version="1" comment="php7-ftp is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630486" version="1" comment="php7-gd is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630487" version="1" comment="php7-gettext is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630488" version="1" comment="php7-gmp is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630489" version="1" comment="php7-iconv is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630490" version="1" comment="php7-intl is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630491" version="1" comment="php7-json is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630492" version="1" comment="php7-ldap is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630493" version="1" comment="php7-mbstring is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630494" version="1" comment="php7-mysql is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630495" version="1" comment="php7-odbc is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630496" version="1" comment="php7-opcache is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630497" version="1" comment="php7-openssl is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630498" version="1" comment="php7-pcntl is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630499" version="1" comment="php7-pdo is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630500" version="1" comment="php7-pgsql is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630501" version="1" comment="php7-phar is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630502" version="1" comment="php7-posix is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630503" version="1" comment="php7-readline is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630504" version="1" comment="php7-shmop is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630505" version="1" comment="php7-snmp is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630506" version="1" comment="php7-soap is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630507" version="1" comment="php7-sockets is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630508" version="1" comment="php7-sodium is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630509" version="1" comment="php7-sqlite is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630510" version="1" comment="php7-sysvmsg is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630511" version="1" comment="php7-sysvsem is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630512" version="1" comment="php7-sysvshm is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630513" version="1" comment="php7-test is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630514" version="1" comment="php7-tidy is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630515" version="1" comment="php7-tokenizer is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630516" version="1" comment="php7-xmlreader is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630517" version="1" comment="php7-xmlrpc is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630518" version="1" comment="php7-xmlwriter is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630519" version="1" comment="php7-xsl is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630520" version="1" comment="php7-zip is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630521" version="1" comment="php7-zlib is &lt;7.4.6-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629510" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629511" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.3-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629512" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629513" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.3-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629514" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-lp152.2.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629515" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629516" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629517" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629518" version="1" comment="webkit-jsc-4 is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629519" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629520" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629521" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.3-lp152.2.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630527" version="1" comment="kernel-debug is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630528" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630529" version="1" comment="kernel-default is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630530" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.87.1.lp152.8.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630531" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.87.1.lp152.8.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630532" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630533" version="1" comment="kernel-devel is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630534" version="1" comment="kernel-docs is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630535" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630536" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630537" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630538" version="1" comment="kernel-macros is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630539" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630540" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630541" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630542" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630543" version="1" comment="kernel-source is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630544" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630545" version="1" comment="kernel-syms is &lt;5.3.18-lp152.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652648" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652649" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.4-lp152.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652650" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652651" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.4-lp152.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652652" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652653" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652654" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652655" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652656" version="1" comment="webkit-jsc-4 is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652657" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652658" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652659" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.4-lp152.2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653942" version="1" comment="python3-salt is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653943" version="1" comment="salt is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653944" version="1" comment="salt-api is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653945" version="1" comment="salt-bash-completion is &lt;3002.2-lp152.3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653946" version="1" comment="salt-cloud is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653947" version="1" comment="salt-doc is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653948" version="1" comment="salt-fish-completion is &lt;3002.2-lp152.3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653949" version="1" comment="salt-master is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653950" version="1" comment="salt-minion is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653951" version="1" comment="salt-proxy is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653952" version="1" comment="salt-ssh is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653953" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653954" version="1" comment="salt-syndic is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653955" version="1" comment="salt-transactional-update is &lt;3002.2-lp152.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653956" version="1" comment="salt-zsh-completion is &lt;3002.2-lp152.3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651179" version="1" comment="erlang-rabbitmq-client is &lt;3.8.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154286" version="1" comment="erlang-rabbitmq-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651180" version="1" comment="rabbitmq-server is &lt;3.8.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154287" version="1" comment="rabbitmq-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651181" version="1" comment="rabbitmq-server-plugins is &lt;3.8.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154288" version="1" comment="rabbitmq-server-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615779" version="1" comment="exiftool is &lt;12.25-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474511" version="1" comment="exiftool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615780" version="1" comment="perl-File-RandomAccess is &lt;12.25-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474513" version="1" comment="perl-File-RandomAccess is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615781" version="1" comment="perl-Image-ExifTool is &lt;12.25-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474515" version="1" comment="perl-Image-ExifTool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633122" version="1" comment="libwireshark14 is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633123" version="1" comment="libwiretap11 is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633124" version="1" comment="libwsutil12 is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633125" version="1" comment="wireshark is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633126" version="1" comment="wireshark-devel is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633127" version="1" comment="wireshark-ui-qt is &lt;3.4.7-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626319" version="1" comment="kernel-debug is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626320" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626321" version="1" comment="kernel-default is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626322" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.84.1.lp152.8.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626323" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.84.1.lp152.8.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626324" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626325" version="1" comment="kernel-devel is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626326" version="1" comment="kernel-docs is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626327" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626328" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626329" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626330" version="1" comment="kernel-macros is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626331" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626332" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626333" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626334" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626335" version="1" comment="kernel-source is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626336" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626337" version="1" comment="kernel-syms is &lt;5.3.18-lp152.84.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613953" version="1" comment="curl is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613954" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613955" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613956" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613957" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613958" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613959" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613960" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614184" version="1" comment="caja-extension-nextcloud is &lt;3.1.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351451" version="1" comment="caja-extension-nextcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614185" version="1" comment="libnextcloudsync-devel is &lt;3.1.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351452" version="1" comment="libnextcloudsync-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614186" version="1" comment="libnextcloudsync0 is &lt;3.1.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351453" version="1" comment="libnextcloudsync0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614187" version="1" comment="nautilus-extension-nextcloud is &lt;3.1.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351454" version="1" comment="nautilus-extension-nextcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614188" version="1" comment="nemo-extension-nextcloud is &lt;3.1.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351455" version="1" comment="nemo-extension-nextcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614189" version="1" comment="nextcloud-desktop is &lt;3.1.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351456" version="1" comment="nextcloud-desktop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614190" version="1" comment="nextcloud-desktop-doc is &lt;3.1.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351457" version="1" comment="nextcloud-desktop-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614191" version="1" comment="nextcloud-desktop-dolphin is &lt;3.1.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351458" version="1" comment="nextcloud-desktop-dolphin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614192" version="1" comment="nextcloud-desktop-lang is &lt;3.1.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351459" version="1" comment="nextcloud-desktop-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656151" version="1" comment="ruby2.5-rubygem-activerecord-5_1 is &lt;5.1.4-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654661" version="1" comment="ruby2.5-rubygem-activerecord-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613506" version="1" comment="nodejs10 is &lt;10.24.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613507" version="1" comment="nodejs10-devel is &lt;10.24.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613508" version="1" comment="nodejs10-docs is &lt;10.24.0-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613422" version="1" comment="nodejs12 is &lt;12.21.0-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613423" version="1" comment="nodejs12-devel is &lt;12.21.0-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613424" version="1" comment="nodejs12-docs is &lt;12.21.0-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613418" version="1" comment="nodejs14 is &lt;14.16.0-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613419" version="1" comment="nodejs14-devel is &lt;14.16.0-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613420" version="1" comment="nodejs14-docs is &lt;14.16.0-lp152.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613509" version="1" comment="npm10 is &lt;10.24.0-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613425" version="1" comment="npm12 is &lt;12.21.0-lp152.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613421" version="1" comment="npm14 is &lt;14.16.0-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613605" version="1" comment="nodejs8 is &lt;8.17.0-lp152.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613606" version="1" comment="nodejs8-devel is &lt;8.17.0-lp152.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613607" version="1" comment="nodejs8-docs is &lt;8.17.0-lp152.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613608" version="1" comment="npm8 is &lt;8.17.0-lp152.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614772" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614773" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614793" version="1" comment="curl is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614794" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614795" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614796" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614797" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614798" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614799" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614800" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626682" version="1" comment="curl is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626683" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626684" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626685" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626686" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626687" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626688" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626689" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658737" version="1" comment="tor is &lt;0.4.6.8-lp152.2.18.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632617" version="1" comment="nodejs10 is &lt;10.24.1-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632618" version="1" comment="nodejs10-devel is &lt;10.24.1-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632619" version="1" comment="nodejs10-docs is &lt;10.24.1-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632222" version="1" comment="nodejs12 is &lt;12.22.5-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632223" version="1" comment="nodejs12-devel is &lt;12.22.5-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632224" version="1" comment="nodejs12-docs is &lt;12.22.5-lp152.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634497" version="1" comment="nodejs14 is &lt;14.17.5-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634498" version="1" comment="nodejs14-devel is &lt;14.17.5-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634499" version="1" comment="nodejs14-docs is &lt;14.17.5-lp152.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651578" version="1" comment="nodejs8 is &lt;8.17.0-lp152.3.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651579" version="1" comment="nodejs8-devel is &lt;8.17.0-lp152.3.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651580" version="1" comment="nodejs8-docs is &lt;8.17.0-lp152.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632620" version="1" comment="npm10 is &lt;10.24.1-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632225" version="1" comment="npm12 is &lt;12.22.5-lp152.3.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634500" version="1" comment="npm14 is &lt;14.17.5-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651581" version="1" comment="npm8 is &lt;8.17.0-lp152.3.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652717" version="1" comment="curl is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652718" version="1" comment="curl-mini is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652719" version="1" comment="libcurl-devel is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652720" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-lp152.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652721" version="1" comment="libcurl-mini-devel is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652722" version="1" comment="libcurl4 is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652723" version="1" comment="libcurl4-32bit is &lt;7.66.0-lp152.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652724" version="1" comment="libcurl4-mini is &lt;7.66.0-lp152.3.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659594" version="1" comment="nodejs12 is &lt;12.22.7-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659595" version="1" comment="nodejs12-devel is &lt;12.22.7-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659596" version="1" comment="nodejs12-docs is &lt;12.22.7-lp152.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659455" version="1" comment="nodejs14 is &lt;14.18.1-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659456" version="1" comment="nodejs14-devel is &lt;14.18.1-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659457" version="1" comment="nodejs14-docs is &lt;14.18.1-lp152.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659597" version="1" comment="npm12 is &lt;12.22.7-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659458" version="1" comment="npm14 is &lt;14.18.1-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614989" version="1" comment="nginx is &lt;1.16.1-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153280" version="1" comment="nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614990" version="1" comment="nginx-source is &lt;1.16.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266795" version="1" comment="nginx-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614991" version="1" comment="vim-plugin-nginx is &lt;1.16.1-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173966" version="1" comment="vim-plugin-nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659934" version="1" comment="postgresql10 is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659935" version="1" comment="postgresql10-contrib is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659936" version="1" comment="postgresql10-devel is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659937" version="1" comment="postgresql10-docs is &lt;10.19-lp152.2.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659938" version="1" comment="postgresql10-plperl is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659939" version="1" comment="postgresql10-plpython is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659940" version="1" comment="postgresql10-pltcl is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659941" version="1" comment="postgresql10-server is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659942" version="1" comment="postgresql10-test is &lt;10.19-lp152.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612983" version="1" comment="sudo is &lt;1.8.22-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612984" version="1" comment="sudo-devel is &lt;1.8.22-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152559" version="1" comment="sudo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612985" version="1" comment="sudo-test is &lt;1.8.22-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152560" version="1" comment="sudo-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613778" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613779" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613780" version="1" comment="python is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613781" version="1" comment="python-32bit is &lt;2.7.18-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613782" version="1" comment="python-base is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613783" version="1" comment="python-base-32bit is &lt;2.7.18-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613784" version="1" comment="python-curses is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613785" version="1" comment="python-demo is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613786" version="1" comment="python-devel is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613787" version="1" comment="python-doc is &lt;2.7.18-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613788" version="1" comment="python-doc-pdf is &lt;2.7.18-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613789" version="1" comment="python-gdbm is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613790" version="1" comment="python-idle is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613791" version="1" comment="python-tk is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613792" version="1" comment="python-xml is &lt;2.7.18-lp152.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614279" version="1" comment="nodejs-underscore is &lt;1.13.1-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351799" version="1" comment="nodejs-underscore is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632591" version="1" comment="java-11-openjdk is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632592" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632593" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632594" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632595" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632596" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0-lp152.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632597" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632598" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0-lp152.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613766" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613767" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp152.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613733" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-lp152.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613734" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-lp152.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613768" version="1" comment="libopenssl10 is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613769" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613770" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp152.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613771" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613772" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp152.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613773" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613774" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp152.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613735" version="1" comment="libopenssl1_1 is &lt;1.1.1d-lp152.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613736" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-lp152.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613737" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-lp152.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613738" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-lp152.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613775" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613776" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613777" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp152.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613739" version="1" comment="openssl-1_1 is &lt;1.1.1d-lp152.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613740" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-lp152.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614314" version="1" comment="MozillaFirefox is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614315" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614316" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614317" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614318" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614319" version="1" comment="MozillaFirefox-translations-other is &lt;78.10.0-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614470" version="1" comment="MozillaThunderbird is &lt;78.10.0-lp152.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614471" version="1" comment="MozillaThunderbird-translations-common is &lt;78.10.0-lp152.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614472" version="1" comment="MozillaThunderbird-translations-other is &lt;78.10.0-lp152.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613510" version="1" comment="MozillaFirefox is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613511" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613512" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613513" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613514" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613515" version="1" comment="MozillaFirefox-translations-other is &lt;78.8.0-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613602" version="1" comment="MozillaThunderbird is &lt;78.8.0-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613603" version="1" comment="MozillaThunderbird-translations-common is &lt;78.8.0-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613604" version="1" comment="MozillaThunderbird-translations-other is &lt;78.8.0-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613925" version="1" comment="MozillaFirefox is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613926" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613927" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613928" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613929" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613930" version="1" comment="MozillaFirefox-translations-other is &lt;78.9.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614212" version="1" comment="MozillaThunderbird is &lt;78.9.1-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614213" version="1" comment="MozillaThunderbird-translations-common is &lt;78.9.1-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614214" version="1" comment="MozillaThunderbird-translations-other is &lt;78.9.1-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613871" version="1" comment="libzstd-devel is &lt;1.4.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262523" version="1" comment="libzstd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613872" version="1" comment="libzstd-devel-static is &lt;1.4.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262524" version="1" comment="libzstd-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613873" version="1" comment="libzstd1 is &lt;1.4.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262525" version="1" comment="libzstd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613874" version="1" comment="libzstd1-32bit is &lt;1.4.4-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266836" version="1" comment="libzstd1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613875" version="1" comment="zstd is &lt;1.4.4-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262526" version="1" comment="zstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629532" version="1" comment="python3-virtualbox is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629533" version="1" comment="virtualbox is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629534" version="1" comment="virtualbox-devel is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629535" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.26-lp152.2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629536" version="1" comment="virtualbox-guest-source is &lt;6.1.26-lp152.2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629537" version="1" comment="virtualbox-guest-tools is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629538" version="1" comment="virtualbox-guest-x11 is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629539" version="1" comment="virtualbox-host-source is &lt;6.1.26-lp152.2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629540" version="1" comment="virtualbox-kmp-default is &lt;6.1.26_k5.3.18_lp152.84-lp152.2.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629541" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.26_k5.3.18_lp152.84-lp152.2.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629542" version="1" comment="virtualbox-qt is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629543" version="1" comment="virtualbox-vnc is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629544" version="1" comment="virtualbox-websrv is &lt;6.1.26-lp152.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615782" version="1" comment="Botan is &lt;2.10.0-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475537" version="1" comment="Botan is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615783" version="1" comment="Botan-doc is &lt;2.10.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475539" version="1" comment="Botan-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615784" version="1" comment="libbotan-2-10 is &lt;2.10.0-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475541" version="1" comment="libbotan-2-10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511050" version="1" comment="libbotan-2-10-32bit is &lt;2.10.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475542" version="1" comment="libbotan-2-10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615785" version="1" comment="libbotan-devel is &lt;2.10.0-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475544" version="1" comment="libbotan-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511053" version="1" comment="libbotan-devel-32bit is &lt;2.10.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475545" version="1" comment="libbotan-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615786" version="1" comment="python3-botan is &lt;2.10.0-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475547" version="1" comment="python3-botan is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651582" version="1" comment="libmbedcrypto3 is &lt;2.16.9-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651583" version="1" comment="libmbedcrypto3-32bit is &lt;2.16.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651584" version="1" comment="libmbedtls12 is &lt;2.16.9-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651585" version="1" comment="libmbedtls12-32bit is &lt;2.16.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651586" version="1" comment="libmbedx509-0 is &lt;2.16.9-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651587" version="1" comment="libmbedx509-0-32bit is &lt;2.16.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651588" version="1" comment="mbedtls-devel is &lt;2.16.9-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613253" version="1" comment="tomcat is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613254" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613255" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613256" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613257" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613258" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613259" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613260" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613261" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613262" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613263" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653786" version="1" comment="python3-virtualbox is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653787" version="1" comment="virtualbox is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653788" version="1" comment="virtualbox-devel is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653789" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.28-lp152.2.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653790" version="1" comment="virtualbox-guest-source is &lt;6.1.28-lp152.2.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653791" version="1" comment="virtualbox-guest-tools is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653792" version="1" comment="virtualbox-guest-x11 is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653793" version="1" comment="virtualbox-host-source is &lt;6.1.28-lp152.2.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653794" version="1" comment="virtualbox-kmp-default is &lt;6.1.28_k5.3.18_lp152.95-lp152.2.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653795" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.28_k5.3.18_lp152.95-lp152.2.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653796" version="1" comment="virtualbox-qt is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653797" version="1" comment="virtualbox-vnc is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653798" version="1" comment="virtualbox-websrv is &lt;6.1.28-lp152.2.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613942" version="1" comment="tomcat is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613943" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613944" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613945" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613946" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613947" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613948" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613949" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613950" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613951" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613952" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614488" version="1" comment="bind is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614489" version="1" comment="bind-chrootenv is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614490" version="1" comment="bind-devel is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614491" version="1" comment="bind-devel-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614492" version="1" comment="bind-doc is &lt;9.16.6-lp152.14.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614493" version="1" comment="bind-utils is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614494" version="1" comment="libbind9-1600 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614495" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614496" version="1" comment="libdns1605 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614497" version="1" comment="libdns1605-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614498" version="1" comment="libirs-devel is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614499" version="1" comment="libirs1601 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614500" version="1" comment="libirs1601-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614501" version="1" comment="libisc1606 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614502" version="1" comment="libisc1606-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614503" version="1" comment="libisccc1600 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614504" version="1" comment="libisccc1600-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614505" version="1" comment="libisccfg1600 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614506" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614507" version="1" comment="libns1604 is &lt;9.16.6-lp152.14.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614508" version="1" comment="libns1604-32bit is &lt;9.16.6-lp152.14.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614509" version="1" comment="python3-bind is &lt;9.16.6-lp152.14.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614983" version="1" comment="dhcp is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151310" version="1" comment="dhcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614984" version="1" comment="dhcp-client is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151311" version="1" comment="dhcp-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614985" version="1" comment="dhcp-devel is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153188" version="1" comment="dhcp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614986" version="1" comment="dhcp-doc is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151312" version="1" comment="dhcp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614987" version="1" comment="dhcp-relay is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151313" version="1" comment="dhcp-relay is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614988" version="1" comment="dhcp-server is &lt;4.3.6.P1-lp152.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151314" version="1" comment="dhcp-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657913" version="1" comment="bind is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657914" version="1" comment="bind-chrootenv is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657915" version="1" comment="bind-devel is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657916" version="1" comment="bind-devel-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657917" version="1" comment="bind-doc is &lt;9.16.6-lp152.14.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657918" version="1" comment="bind-utils is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657919" version="1" comment="libbind9-1600 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657920" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657921" version="1" comment="libdns1605 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657922" version="1" comment="libdns1605-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657923" version="1" comment="libirs-devel is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657924" version="1" comment="libirs1601 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657925" version="1" comment="libirs1601-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657926" version="1" comment="libisc1606 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657927" version="1" comment="libisc1606-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657928" version="1" comment="libisccc1600 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657929" version="1" comment="libisccc1600-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657930" version="1" comment="libisccfg1600 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657931" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657932" version="1" comment="libns1604 is &lt;9.16.6-lp152.14.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657933" version="1" comment="libns1604-32bit is &lt;9.16.6-lp152.14.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657934" version="1" comment="python3-bind is &lt;9.16.6-lp152.14.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614447" version="1" comment="cups is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614448" version="1" comment="cups-client is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614449" version="1" comment="cups-config is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614450" version="1" comment="cups-ddk is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614451" version="1" comment="cups-devel is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614452" version="1" comment="cups-devel-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614453" version="1" comment="libcups2 is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614454" version="1" comment="libcups2-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614455" version="1" comment="libcupscgi1 is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614456" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614457" version="1" comment="libcupsimage2 is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614458" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614459" version="1" comment="libcupsmime1 is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614460" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614461" version="1" comment="libcupsppdc1 is &lt;2.2.7-lp152.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614462" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-lp152.9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624090" version="1" comment="arpwatch is &lt;2.1a15-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623984" version="1" comment="arpwatch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624091" version="1" comment="arpwatch-ethercodes-build is &lt;2.1a15-lp152.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623985" version="1" comment="arpwatch-ethercodes-build is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614338" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.46.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151634" version="1" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614339" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.46.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153668" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614340" version="1" comment="librsvg-2-2 is &lt;2.46.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151635" version="1" comment="librsvg-2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614341" version="1" comment="librsvg-2-2-32bit is &lt;2.46.5-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153670" version="1" comment="librsvg-2-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614342" version="1" comment="librsvg-devel is &lt;2.46.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151636" version="1" comment="librsvg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614343" version="1" comment="librsvg-lang is &lt;2.46.5-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353379" version="1" comment="librsvg-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614344" version="1" comment="rsvg-convert is &lt;2.46.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353380" version="1" comment="rsvg-convert is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614345" version="1" comment="rsvg-thumbnailer is &lt;2.46.5-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161885" version="1" comment="rsvg-thumbnailer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614346" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.46.5-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151637" version="1" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613697" version="1" comment="connman is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347742" version="1" comment="connman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613698" version="1" comment="connman-client is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347743" version="1" comment="connman-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613699" version="1" comment="connman-devel is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347744" version="1" comment="connman-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613700" version="1" comment="connman-doc is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347745" version="1" comment="connman-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613701" version="1" comment="connman-nmcompat is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347746" version="1" comment="connman-nmcompat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613702" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347747" version="1" comment="connman-plugin-hh2serial-gps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613703" version="1" comment="connman-plugin-iospm is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347748" version="1" comment="connman-plugin-iospm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613704" version="1" comment="connman-plugin-l2tp is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347749" version="1" comment="connman-plugin-l2tp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613705" version="1" comment="connman-plugin-openconnect is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347750" version="1" comment="connman-plugin-openconnect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613706" version="1" comment="connman-plugin-openvpn is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347751" version="1" comment="connman-plugin-openvpn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613707" version="1" comment="connman-plugin-polkit is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347752" version="1" comment="connman-plugin-polkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613708" version="1" comment="connman-plugin-pptp is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347753" version="1" comment="connman-plugin-pptp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613709" version="1" comment="connman-plugin-tist is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347754" version="1" comment="connman-plugin-tist is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613710" version="1" comment="connman-plugin-vpnc is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347755" version="1" comment="connman-plugin-vpnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613711" version="1" comment="connman-plugin-wireguard is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347756" version="1" comment="connman-plugin-wireguard is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613712" version="1" comment="connman-test is &lt;1.39-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347757" version="1" comment="connman-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613477" version="1" comment="avahi is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613478" version="1" comment="avahi-autoipd is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151209" version="1" comment="avahi-autoipd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613479" version="1" comment="avahi-compat-howl-devel is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243729" version="1" comment="avahi-compat-howl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613480" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151210" version="1" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613481" version="1" comment="avahi-lang is &lt;0.7-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151211" version="1" comment="avahi-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613482" version="1" comment="avahi-mono is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243731" version="1" comment="avahi-mono is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613483" version="1" comment="avahi-utils is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243733" version="1" comment="avahi-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613484" version="1" comment="avahi-utils-gtk is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243734" version="1" comment="avahi-utils-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613485" version="1" comment="libavahi-client3 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613486" version="1" comment="libavahi-client3-32bit is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151213" version="1" comment="libavahi-client3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613487" version="1" comment="libavahi-common3 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613488" version="1" comment="libavahi-common3-32bit is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151215" version="1" comment="libavahi-common3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613489" version="1" comment="libavahi-core7 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613490" version="1" comment="libavahi-devel is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151217" version="1" comment="libavahi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613491" version="1" comment="libavahi-glib-devel is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243735" version="1" comment="libavahi-glib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613492" version="1" comment="libavahi-glib1 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243736" version="1" comment="libavahi-glib1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613493" version="1" comment="libavahi-glib1-32bit is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243737" version="1" comment="libavahi-glib1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613494" version="1" comment="libavahi-gobject-devel is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243738" version="1" comment="libavahi-gobject-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613495" version="1" comment="libavahi-gobject0 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243739" version="1" comment="libavahi-gobject0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613496" version="1" comment="libavahi-qt4-1 is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243740" version="1" comment="libavahi-qt4-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613497" version="1" comment="libavahi-qt4-devel is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243741" version="1" comment="libavahi-qt4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613498" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243742" version="1" comment="libavahi-ui-gtk3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613499" version="1" comment="libavahi-ui0 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243743" version="1" comment="libavahi-ui0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613500" version="1" comment="libdns_sd is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151218" version="1" comment="libdns_sd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613501" version="1" comment="libdns_sd-32bit is &lt;0.7-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243744" version="1" comment="libdns_sd-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613502" version="1" comment="libhowl0 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243745" version="1" comment="libhowl0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613503" version="1" comment="python3-avahi is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346636" version="1" comment="python3-avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613504" version="1" comment="python3-avahi-gtk is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346637" version="1" comment="python3-avahi-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613505" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.7-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243748" version="1" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613753" version="1" comment="python2-markdown2 is &lt;2.4.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283130" version="1" comment="python2-markdown2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613754" version="1" comment="python3-markdown2 is &lt;2.4.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283131" version="1" comment="python3-markdown2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613192" version="1" comment="screen is &lt;4.6.2-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177244" version="1" comment="screen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615143" version="1" comment="xterm is &lt;330-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479911" version="1" comment="xterm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615144" version="1" comment="xterm-bin is &lt;330-lp152.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479912" version="1" comment="xterm-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613653" version="1" comment="gio-branding-upstream is &lt;2.62.6-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241263" version="1" comment="gio-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613654" version="1" comment="glib2-devel is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151142" version="1" comment="glib2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613655" version="1" comment="glib2-devel-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241265" version="1" comment="glib2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613656" version="1" comment="glib2-devel-static is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241266" version="1" comment="glib2-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613657" version="1" comment="glib2-lang is &lt;2.62.6-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151143" version="1" comment="glib2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613658" version="1" comment="glib2-tests is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347480" version="1" comment="glib2-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613659" version="1" comment="glib2-tools is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613660" version="1" comment="glib2-tools-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241267" version="1" comment="glib2-tools-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613661" version="1" comment="libgio-2_0-0 is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613662" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151146" version="1" comment="libgio-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613663" version="1" comment="libgio-fam is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241268" version="1" comment="libgio-fam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613664" version="1" comment="libgio-fam-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241269" version="1" comment="libgio-fam-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613665" version="1" comment="libglib-2_0-0 is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613666" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151148" version="1" comment="libglib-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613667" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613668" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151150" version="1" comment="libgmodule-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613669" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613670" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151152" version="1" comment="libgobject-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613671" version="1" comment="libgthread-2_0-0 is &lt;2.62.6-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151153" version="1" comment="libgthread-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613672" version="1" comment="libgthread-2_0-0-32bit is &lt;2.62.6-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151154" version="1" comment="libgthread-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659014" version="1" comment="python3-Pygments is &lt;2.6.1-lp152.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630897" version="1" comment="grafana is &lt;7.5.7-lp152.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613637" version="1" comment="wpa_supplicant is &lt;2.9-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613638" version="1" comment="wpa_supplicant-gui is &lt;2.9-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613868" version="1" comment="go1.15 is &lt;1.15.10-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613869" version="1" comment="go1.15-doc is &lt;1.15.10-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613870" version="1" comment="go1.15-race is &lt;1.15.10-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631120" version="1" comment="ansible is &lt;2.9.21-lp152.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166857" version="1" comment="ansible is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631121" version="1" comment="ansible-doc is &lt;2.9.21-lp152.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281504" version="1" comment="ansible-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631122" version="1" comment="ansible-test is &lt;2.9.21-lp152.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281505" version="1" comment="ansible-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631123" version="1" comment="dracut-saltboot is &lt;0.1.1627546504.96a0b3e-lp152.2.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631124" version="1" comment="golang-github-prometheus-prometheus is &lt;2.27.1-lp152.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630838" version="1" comment="golang-github-prometheus-prometheus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613809" version="1" comment="tor is &lt;0.4.5.7-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625512" version="1" comment="liblasso-devel is &lt;2.6.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625538" version="1" comment="liblasso-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625513" version="1" comment="liblasso3 is &lt;2.6.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625539" version="1" comment="liblasso3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625514" version="1" comment="python3-lasso is &lt;2.6.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625540" version="1" comment="python3-lasso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653850" version="1" comment="squid is &lt;4.17-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613937" version="1" comment="ovmf is &lt;201911-lp152.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613938" version="1" comment="ovmf-tools is &lt;201911-lp152.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613939" version="1" comment="qemu-ovmf-ia32 is &lt;201911-lp152.6.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613940" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-lp152.6.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613941" version="1" comment="qemu-ovmf-x86_64-debug is &lt;201911-lp152.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614159" version="1" comment="fluidsynth is &lt;1.1.11-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351203" version="1" comment="fluidsynth is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614160" version="1" comment="fluidsynth-devel is &lt;1.1.11-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351204" version="1" comment="fluidsynth-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614161" version="1" comment="libfluidsynth1 is &lt;1.1.11-lp152.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351205" version="1" comment="libfluidsynth1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614162" version="1" comment="libfluidsynth1-32bit is &lt;1.1.11-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351206" version="1" comment="libfluidsynth1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613966" version="1" comment="xen is &lt;4.13.2_08-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613967" version="1" comment="xen-devel is &lt;4.13.2_08-lp152.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613968" version="1" comment="xen-doc-html is &lt;4.13.2_08-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613969" version="1" comment="xen-libs is &lt;4.13.2_08-lp152.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613970" version="1" comment="xen-libs-32bit is &lt;4.13.2_08-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613971" version="1" comment="xen-tools is &lt;4.13.2_08-lp152.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613972" version="1" comment="xen-tools-domU is &lt;4.13.2_08-lp152.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613973" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_08-lp152.2.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633715" version="1" comment="xen is &lt;4.13.3_04-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633716" version="1" comment="xen-devel is &lt;4.13.3_04-lp152.2.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633717" version="1" comment="xen-doc-html is &lt;4.13.3_04-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633718" version="1" comment="xen-libs is &lt;4.13.3_04-lp152.2.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633719" version="1" comment="xen-libs-32bit is &lt;4.13.3_04-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633720" version="1" comment="xen-tools is &lt;4.13.3_04-lp152.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633721" version="1" comment="xen-tools-domU is &lt;4.13.3_04-lp152.2.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633722" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.3_04-lp152.2.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659213" version="1" comment="xen is &lt;4.13.4_02-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659214" version="1" comment="xen-devel is &lt;4.13.4_02-lp152.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659215" version="1" comment="xen-doc-html is &lt;4.13.4_02-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659216" version="1" comment="xen-libs is &lt;4.13.4_02-lp152.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659217" version="1" comment="xen-libs-32bit is &lt;4.13.4_02-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659218" version="1" comment="xen-tools is &lt;4.13.4_02-lp152.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659219" version="1" comment="xen-tools-domU is &lt;4.13.4_02-lp152.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659220" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.4_02-lp152.2.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614301" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614302" version="1" comment="ruby2.5 is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614303" version="1" comment="ruby2.5-devel is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614304" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614305" version="1" comment="ruby2.5-doc is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614306" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614307" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633129" version="1" comment="haserl is &lt;0.9.36-lp152.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633130" version="1" comment="haserl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615018" version="1" comment="umoci is &lt;0.4.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351183" version="1" comment="umoci is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615045" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615046" version="1" comment="cluster-md-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615047" version="1" comment="dlm-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615048" version="1" comment="dlm-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615049" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615050" version="1" comment="gfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614625" version="1" comment="kernel-debug is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614626" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614627" version="1" comment="kernel-default is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614628" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.75.1.lp152.8.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614629" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.75.1.lp152.8.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614630" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614631" version="1" comment="kernel-devel is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615051" version="1" comment="kernel-devel-rt is &lt;5.3.18-lp152.3.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614632" version="1" comment="kernel-docs is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614633" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614634" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614635" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614636" version="1" comment="kernel-macros is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614637" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614638" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614639" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614640" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615052" version="1" comment="kernel-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615053" version="1" comment="kernel-rt-devel is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615054" version="1" comment="kernel-rt-extra is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615055" version="1" comment="kernel-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615056" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615057" version="1" comment="kernel-rt_debug-extra is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614641" version="1" comment="kernel-source is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615058" version="1" comment="kernel-source-rt is &lt;5.3.18-lp152.3.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614642" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614643" version="1" comment="kernel-syms is &lt;5.3.18-lp152.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615059" version="1" comment="kernel-syms-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615060" version="1" comment="kselftests-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615061" version="1" comment="kselftests-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615062" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615063" version="1" comment="ocfs2-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615064" version="1" comment="reiserfs-kmp-rt is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615065" version="1" comment="reiserfs-kmp-rt_debug is &lt;5.3.18-lp152.3.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614283" version="1" comment="apache-commons-io is &lt;2.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351800" version="1" comment="apache-commons-io is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614284" version="1" comment="apache-commons-io-javadoc is &lt;2.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351801" version="1" comment="apache-commons-io-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633742" version="1" comment="php-composer is &lt;1.10.22-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633743" version="1" comment="php-composer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615186" version="1" comment="xstream is &lt;1.4.17-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615187" version="1" comment="xstream-benchmark is &lt;1.4.17-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615188" version="1" comment="xstream-javadoc is &lt;1.4.17-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615189" version="1" comment="xstream-parent is &lt;1.4.17-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615031" version="1" comment="MozillaFirefox is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615032" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615033" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615034" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615035" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615036" version="1" comment="MozillaFirefox-translations-other is &lt;78.11.0-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615183" version="1" comment="MozillaThunderbird is &lt;78.11.0-lp152.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615184" version="1" comment="MozillaThunderbird-translations-common is &lt;78.11.0-lp152.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615185" version="1" comment="MozillaThunderbird-translations-other is &lt;78.11.0-lp152.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627841" version="1" comment="MozillaThunderbird is &lt;78.12.0-lp152.2.48.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627842" version="1" comment="MozillaThunderbird-translations-common is &lt;78.12.0-lp152.2.48.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627843" version="1" comment="MozillaThunderbird-translations-other is &lt;78.12.0-lp152.2.48.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625532" version="1" comment="MozillaFirefox is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625533" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625534" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625535" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625536" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625537" version="1" comment="MozillaFirefox-translations-other is &lt;78.12.0-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652642" version="1" comment="MozillaFirefox is &lt;91.2.0-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652643" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.2.0-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631608" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.13.0-lp152.2.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652644" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652645" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652646" version="1" comment="MozillaFirefox-translations-other is &lt;91.2.0-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652647" version="1" comment="rust-cbindgen is &lt;0.19.0-lp152.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661935" version="1" comment="MozillaThunderbird is &lt;91.4.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661936" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661937" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.0-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614178" version="1" comment="wpa_supplicant is &lt;2.9-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614179" version="1" comment="wpa_supplicant-gui is &lt;2.9-lp152.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614755" version="1" comment="libmpv1 is &lt;0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172255" version="1" comment="libmpv1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614756" version="1" comment="mpv is &lt;0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172256" version="1" comment="mpv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614757" version="1" comment="mpv-bash-completion is &lt;0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172257" version="1" comment="mpv-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614758" version="1" comment="mpv-devel is &lt;0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172258" version="1" comment="mpv-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614759" version="1" comment="mpv-zsh-completion is &lt;0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172259" version="1" comment="mpv-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613692" version="1" comment="crmsh is &lt;4.3.0+20210305.9db5c9a8-lp152.4.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613693" version="1" comment="crmsh-scripts is &lt;4.3.0+20210305.9db5c9a8-lp152.4.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613694" version="1" comment="crmsh-test is &lt;4.3.0+20210305.9db5c9a8-lp152.4.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653799" version="1" comment="containerd is &lt;1.4.11-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653800" version="1" comment="containerd-ctr is &lt;1.4.11-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653801" version="1" comment="docker is &lt;20.10.9_ce-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653802" version="1" comment="docker-bash-completion is &lt;20.10.9_ce-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653803" version="1" comment="docker-fish-completion is &lt;20.10.9_ce-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653804" version="1" comment="docker-zsh-completion is &lt;20.10.9_ce-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653805" version="1" comment="runc is &lt;1.0.2-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652581" version="1" comment="aom-tools is &lt;1.0.0-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652582" version="1" comment="libaom-devel is &lt;1.0.0-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652583" version="1" comment="libaom-devel-doc is &lt;1.0.0-lp152.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652584" version="1" comment="libaom0 is &lt;1.0.0-lp152.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652585" version="1" comment="libaom0-32bit is &lt;1.0.0-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632802" version="1" comment="aom-tools is &lt;1.0.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632803" version="1" comment="libaom-devel is &lt;1.0.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632804" version="1" comment="libaom-devel-doc is &lt;1.0.0-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632805" version="1" comment="libaom0 is &lt;1.0.0-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632806" version="1" comment="libaom0-32bit is &lt;1.0.0-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614729" version="1" comment="chromedriver is &lt;90.0.4430.212-lp152.2.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614730" version="1" comment="chromium is &lt;90.0.4430.212-lp152.2.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614934" version="1" comment="opera is &lt;76.0.4017.154-lp152.2.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626202" version="1" comment="chromedriver is &lt;91.0.4472.164-lp152.2.113.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626203" version="1" comment="chromium is &lt;91.0.4472.164-lp152.2.113.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628182" version="1" comment="opera is &lt;77.0.4054.277-lp152.2.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615081" version="1" comment="chromedriver is &lt;91.0.4472.101-lp152.2.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615082" version="1" comment="chromium is &lt;91.0.4472.101-lp152.2.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624113" version="1" comment="opera is &lt;77.0.4054.146-lp152.2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615126" version="1" comment="chromedriver is &lt;91.0.4472.114-lp152.2.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615127" version="1" comment="chromium is &lt;91.0.4472.114-lp152.2.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630522" version="1" comment="chromedriver is &lt;92.0.4515.131-lp152.2.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630523" version="1" comment="chromium is &lt;92.0.4515.131-lp152.2.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632013" version="1" comment="opera is &lt;78.0.4093.147-lp152.2.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631504" version="1" comment="chromedriver is &lt;92.0.4515.159-lp152.2.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631505" version="1" comment="chromium is &lt;92.0.4515.159-lp152.2.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632479" version="1" comment="opera is &lt;78.0.4093.184-lp152.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633875" version="1" comment="chromedriver is &lt;93.0.4577.82-lp152.2.125.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633876" version="1" comment="chromium is &lt;93.0.4577.82-lp152.2.125.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634042" version="1" comment="opera is &lt;79.0.4143.22-lp152.2.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651178" version="1" comment="opera is &lt;79.0.4143.50-lp152.2.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657141" version="1" comment="tomcat is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657142" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657143" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657144" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657145" version="1" comment="tomcat-embed is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657146" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657147" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657148" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657149" version="1" comment="tomcat-lib is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657150" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657151" version="1" comment="tomcat-webapps is &lt;9.0.36-lp152.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659482" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659483" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659484" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.1-lp152.2.25.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659485" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659486" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659487" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659488" version="1" comment="webkit-jsc-4 is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659489" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659490" version="1" comment="webkit2gtk3-devel is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659491" version="1" comment="webkit2gtk3-minibrowser is &lt;2.34.1-lp152.2.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612991" version="1" comment="go1.14 is &lt;1.14.14-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612992" version="1" comment="go1.14-doc is &lt;1.14.14-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612993" version="1" comment="go1.14-race is &lt;1.14.14-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612988" version="1" comment="go1.15 is &lt;1.15.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612989" version="1" comment="go1.15-doc is &lt;1.15.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612990" version="1" comment="go1.15-race is &lt;1.15.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614804" version="1" comment="libnss_slurm2 is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614805" version="1" comment="libpmi0 is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614806" version="1" comment="libslurm35 is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614807" version="1" comment="perl-slurm is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614808" version="1" comment="slurm is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614809" version="1" comment="slurm-auth-none is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614810" version="1" comment="slurm-config is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614811" version="1" comment="slurm-config-man is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614812" version="1" comment="slurm-cray is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614813" version="1" comment="slurm-devel is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614814" version="1" comment="slurm-doc is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614815" version="1" comment="slurm-hdf5 is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614816" version="1" comment="slurm-lua is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614817" version="1" comment="slurm-munge is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614818" version="1" comment="slurm-node is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614819" version="1" comment="slurm-openlava is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614820" version="1" comment="slurm-pam_slurm is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614821" version="1" comment="slurm-plugins is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614822" version="1" comment="slurm-rest is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614823" version="1" comment="slurm-seff is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614824" version="1" comment="slurm-sjstat is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614825" version="1" comment="slurm-slurmdbd is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614826" version="1" comment="slurm-sql is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614827" version="1" comment="slurm-sview is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614828" version="1" comment="slurm-torque is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614829" version="1" comment="slurm-webdoc is &lt;20.02.7-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615248" version="1" comment="libtcmu2 is &lt;1.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342056" version="1" comment="libtcmu2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615249" version="1" comment="tcmu-runner is &lt;1.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342057" version="1" comment="tcmu-runner is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615250" version="1" comment="tcmu-runner-handler-rbd is &lt;1.5.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342058" version="1" comment="tcmu-runner-handler-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615147" version="1" comment="go1.15 is &lt;1.15.12-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615148" version="1" comment="go1.15-doc is &lt;1.15.12-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615149" version="1" comment="go1.15-race is &lt;1.15.12-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615024" version="1" comment="libX11-6 is &lt;1.6.5-lp152.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615025" version="1" comment="libX11-6-32bit is &lt;1.6.5-lp152.5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615026" version="1" comment="libX11-data is &lt;1.6.5-lp152.5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615027" version="1" comment="libX11-devel is &lt;1.6.5-lp152.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615028" version="1" comment="libX11-devel-32bit is &lt;1.6.5-lp152.5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615029" version="1" comment="libX11-xcb1 is &lt;1.6.5-lp152.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615030" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-lp152.5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614280" version="1" comment="sudo is &lt;1.8.22-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614281" version="1" comment="sudo-devel is &lt;1.8.22-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614282" version="1" comment="sudo-test is &lt;1.8.22-lp152.8.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659192" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659193" version="1" comment="ruby2.5 is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659194" version="1" comment="ruby2.5-devel is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659195" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659196" version="1" comment="ruby2.5-doc is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659197" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-lp152.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659198" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612968" version="1" comment="mutt is &lt;1.10.1-lp152.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612969" version="1" comment="mutt-doc is &lt;1.10.1-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009612970" version="1" comment="mutt-lang is &lt;1.10.1-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614830" version="1" comment="gstreamer is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154019" version="1" comment="gstreamer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614831" version="1" comment="gstreamer-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154020" version="1" comment="gstreamer-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614832" version="1" comment="gstreamer-devel is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154021" version="1" comment="gstreamer-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614833" version="1" comment="gstreamer-doc is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154022" version="1" comment="gstreamer-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614834" version="1" comment="gstreamer-lang is &lt;1.16.3-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154023" version="1" comment="gstreamer-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614835" version="1" comment="gstreamer-plugins-bad is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153876" version="1" comment="gstreamer-plugins-bad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614836" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153877" version="1" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614837" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476859" version="1" comment="gstreamer-plugins-bad-chromaprint is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614838" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476860" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614839" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153878" version="1" comment="gstreamer-plugins-bad-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614840" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153879" version="1" comment="gstreamer-plugins-bad-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614841" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476861" version="1" comment="gstreamer-plugins-bad-fluidsynth is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614842" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476862" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614843" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.16.3-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153880" version="1" comment="gstreamer-plugins-bad-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614844" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614845" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153928" version="1" comment="gstreamer-plugins-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614846" version="1" comment="gstreamer-plugins-base-devel is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153929" version="1" comment="gstreamer-plugins-base-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614847" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154283" version="1" comment="gstreamer-plugins-base-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614848" version="1" comment="gstreamer-plugins-base-doc is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153930" version="1" comment="gstreamer-plugins-base-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614849" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.3-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153931" version="1" comment="gstreamer-plugins-base-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614850" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153915" version="1" comment="gstreamer-plugins-good is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614851" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153916" version="1" comment="gstreamer-plugins-good-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614852" version="1" comment="gstreamer-plugins-good-doc is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153917" version="1" comment="gstreamer-plugins-good-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614853" version="1" comment="gstreamer-plugins-good-extra is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153918" version="1" comment="gstreamer-plugins-good-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614854" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153919" version="1" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614855" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476863" version="1" comment="gstreamer-plugins-good-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614856" version="1" comment="gstreamer-plugins-good-jack is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476864" version="1" comment="gstreamer-plugins-good-jack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614857" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476865" version="1" comment="gstreamer-plugins-good-jack-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614858" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153920" version="1" comment="gstreamer-plugins-good-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614859" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476866" version="1" comment="gstreamer-plugins-good-qtqml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614860" version="1" comment="gstreamer-plugins-ugly is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177245" version="1" comment="gstreamer-plugins-ugly is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614861" version="1" comment="gstreamer-plugins-ugly-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476867" version="1" comment="gstreamer-plugins-ugly-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614862" version="1" comment="gstreamer-plugins-ugly-doc is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476868" version="1" comment="gstreamer-plugins-ugly-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614863" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.16.3-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177246" version="1" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614864" version="1" comment="gstreamer-utils is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154024" version="1" comment="gstreamer-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614865" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154275" version="1" comment="libgstadaptivedemux-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614866" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154276" version="1" comment="libgstadaptivedemux-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614867" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614868" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153933" version="1" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614869" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614870" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153937" version="1" comment="libgstapp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614871" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614872" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153939" version="1" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614873" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154277" version="1" comment="libgstbadaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614874" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154278" version="1" comment="libgstbadaudio-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614875" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153886" version="1" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614876" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153887" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614877" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153890" version="1" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614878" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153891" version="1" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614879" version="1" comment="libgstfft-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153940" version="1" comment="libgstfft-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614880" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153941" version="1" comment="libgstfft-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614881" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614882" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153893" version="1" comment="libgstgl-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614883" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153894" version="1" comment="libgstinsertbin-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614884" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153895" version="1" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614885" version="1" comment="libgstisoff-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476869" version="1" comment="libgstisoff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614886" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476870" version="1" comment="libgstisoff-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614887" version="1" comment="libgstmpegts-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153896" version="1" comment="libgstmpegts-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614888" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153897" version="1" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614889" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614890" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153945" version="1" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614891" version="1" comment="libgstphotography-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153899" version="1" comment="libgstphotography-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614892" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153900" version="1" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614893" version="1" comment="libgstplayer-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154279" version="1" comment="libgstplayer-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614894" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154280" version="1" comment="libgstplayer-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614895" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154025" version="1" comment="libgstreamer-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614896" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.16.3-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154026" version="1" comment="libgstreamer-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614897" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614898" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153947" version="1" comment="libgstriff-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614899" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153948" version="1" comment="libgstrtp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614900" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153949" version="1" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614901" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153950" version="1" comment="libgstrtsp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614902" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153951" version="1" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614903" version="1" comment="libgstsctp-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476871" version="1" comment="libgstsctp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614904" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476872" version="1" comment="libgstsctp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614905" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153952" version="1" comment="libgstsdp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614906" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153953" version="1" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614907" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614908" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153955" version="1" comment="libgsttag-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614909" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153902" version="1" comment="libgsturidownloader-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614910" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153903" version="1" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614911" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614912" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153957" version="1" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614913" version="1" comment="libgstwayland-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153905" version="1" comment="libgstwayland-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614914" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153906" version="1" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614915" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476873" version="1" comment="libgstwebrtc-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614916" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.16.3-lp152.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476874" version="1" comment="libgstwebrtc-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614917" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.16.3-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154027" version="1" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614918" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153958" version="1" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614919" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153960" version="1" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614920" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153961" version="1" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614921" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476875" version="1" comment="typelib-1_0-GstGL-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614922" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476876" version="1" comment="typelib-1_0-GstInsertBin-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614923" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476877" version="1" comment="typelib-1_0-GstMpegts-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614924" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153964" version="1" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614925" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476878" version="1" comment="typelib-1_0-GstPlayer-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614926" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153966" version="1" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614927" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153967" version="1" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614928" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153968" version="1" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614929" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153969" version="1" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614930" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153970" version="1" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614931" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.16.3-lp152.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476879" version="1" comment="typelib-1_0-GstWebRTC-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614935" version="1" comment="inn is &lt;2.6.2-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614936" version="1" comment="inn-devel is &lt;2.6.2-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614937" version="1" comment="mininews is &lt;2.6.2-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615117" version="1" comment="postgresql10 is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615118" version="1" comment="postgresql10-contrib is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615119" version="1" comment="postgresql10-devel is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615120" version="1" comment="postgresql10-docs is &lt;10.17-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615121" version="1" comment="postgresql10-plperl is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615122" version="1" comment="postgresql10-plpython is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615123" version="1" comment="postgresql10-pltcl is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615124" version="1" comment="postgresql10-server is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615125" version="1" comment="postgresql10-test is &lt;10.17-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614721" version="1" comment="djvulibre is &lt;3.5.27-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266976" version="1" comment="djvulibre is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614722" version="1" comment="djvulibre-doc is &lt;3.5.27-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266977" version="1" comment="djvulibre-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614723" version="1" comment="libdjvulibre-devel is &lt;3.5.27-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266978" version="1" comment="libdjvulibre-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614724" version="1" comment="libdjvulibre21 is &lt;3.5.27-lp152.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266979" version="1" comment="libdjvulibre21 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614998" version="1" comment="redis is &lt;6.0.14-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633131" version="1" comment="fail2ban is &lt;0.11.2-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633132" version="1" comment="fail2ban is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633133" version="1" comment="monitoring-plugins-fail2ban is &lt;0.11.2-lp152.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633134" version="1" comment="monitoring-plugins-fail2ban is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659225" version="1" comment="hiredis is &lt;0.13.3-lp152.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659226" version="1" comment="hiredis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659227" version="1" comment="hiredis-devel is &lt;0.13.3-lp152.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659228" version="1" comment="hiredis-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659229" version="1" comment="libhiredis0_13 is &lt;0.13.3-lp152.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659230" version="1" comment="libhiredis0_13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632800" version="1" comment="nextcloud is &lt;20.0.12-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632801" version="1" comment="nextcloud-apache is &lt;20.0.12-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633128" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-lp152.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270746" version="1" comment="apache2-mod_auth_openidc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614666" version="1" comment="prosody is &lt;0.11.9-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223336" version="1" comment="prosody is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615037" version="1" comment="python3-HyperKitty is &lt;1.3.2-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009478303" version="1" comment="python3-HyperKitty is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632599" version="1" comment="apache2 is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632600" version="1" comment="apache2-devel is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632601" version="1" comment="apache2-doc is &lt;2.4.43-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632602" version="1" comment="apache2-event is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632603" version="1" comment="apache2-example-pages is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632604" version="1" comment="apache2-prefork is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632605" version="1" comment="apache2-utils is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632606" version="1" comment="apache2-worker is &lt;2.4.43-lp152.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624114" version="1" comment="go1.15 is &lt;1.15.13-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624115" version="1" comment="go1.15-doc is &lt;1.15.13-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624116" version="1" comment="go1.15-race is &lt;1.15.13-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615212" version="1" comment="dovecot23 is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615213" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615214" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615215" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615216" version="1" comment="dovecot23-devel is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615217" version="1" comment="dovecot23-fts is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615218" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615219" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615220" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615196" version="1" comment="libgupnp-1_2-0 is &lt;1.2.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615787" version="1" comment="libgupnp-1_2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615197" version="1" comment="libgupnp-1_2-0-32bit is &lt;1.2.2-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615788" version="1" comment="libgupnp-1_2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615198" version="1" comment="libgupnp-devel is &lt;1.2.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615789" version="1" comment="libgupnp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615199" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.2.2-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615790" version="1" comment="typelib-1_0-GUPnP-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615205" version="1" comment="libgcrypt-cavs is &lt;1.8.2-lp152.17.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153048" version="1" comment="libgcrypt-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615206" version="1" comment="libgcrypt-devel is &lt;1.8.2-lp152.17.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151920" version="1" comment="libgcrypt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615207" version="1" comment="libgcrypt-devel-32bit is &lt;1.8.2-lp152.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153049" version="1" comment="libgcrypt-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615208" version="1" comment="libgcrypt20 is &lt;1.8.2-lp152.17.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151921" version="1" comment="libgcrypt20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615209" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-lp152.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151922" version="1" comment="libgcrypt20-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615210" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-lp152.17.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153050" version="1" comment="libgcrypt20-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615211" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-lp152.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153051" version="1" comment="libgcrypt20-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652698" version="1" comment="glibc is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652699" version="1" comment="glibc-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652700" version="1" comment="glibc-devel is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652701" version="1" comment="glibc-devel-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652702" version="1" comment="glibc-devel-static is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652703" version="1" comment="glibc-devel-static-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652704" version="1" comment="glibc-extra is &lt;2.26-lp152.26.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652705" version="1" comment="glibc-html is &lt;2.26-lp152.26.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652706" version="1" comment="glibc-i18ndata is &lt;2.26-lp152.26.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652707" version="1" comment="glibc-info is &lt;2.26-lp152.26.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652708" version="1" comment="glibc-locale is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652709" version="1" comment="glibc-locale-base is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652710" version="1" comment="glibc-locale-base-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652711" version="1" comment="glibc-profile is &lt;2.26-lp152.26.9.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652712" version="1" comment="glibc-profile-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652713" version="1" comment="glibc-utils is &lt;2.26-lp152.26.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652714" version="1" comment="glibc-utils-32bit is &lt;2.26-lp152.26.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652715" version="1" comment="nscd is &lt;2.26-lp152.26.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624835" version="1" comment="jdom2 is &lt;2.0.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624699" version="1" comment="jdom2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624836" version="1" comment="jdom2-javadoc is &lt;2.0.6-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624700" version="1" comment="jdom2-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652660" version="1" comment="libsystemd0 is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154102" version="1" comment="libsystemd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652661" version="1" comment="libsystemd0-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154103" version="1" comment="libsystemd0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652662" version="1" comment="libsystemd0-mini is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154202" version="1" comment="libsystemd0-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652663" version="1" comment="libudev-devel is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151690" version="1" comment="libudev-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652664" version="1" comment="libudev-devel-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239129" version="1" comment="libudev-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652665" version="1" comment="libudev-mini-devel is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152578" version="1" comment="libudev-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652666" version="1" comment="libudev-mini1 is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152579" version="1" comment="libudev-mini1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652667" version="1" comment="libudev1 is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652668" version="1" comment="libudev1-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151692" version="1" comment="libudev1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652669" version="1" comment="nss-myhostname is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152580" version="1" comment="nss-myhostname is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652670" version="1" comment="nss-myhostname-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152581" version="1" comment="nss-myhostname-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652671" version="1" comment="nss-mymachines is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154203" version="1" comment="nss-mymachines is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652672" version="1" comment="nss-mymachines-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239130" version="1" comment="nss-mymachines-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652673" version="1" comment="nss-systemd is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239131" version="1" comment="nss-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652674" version="1" comment="systemd is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652675" version="1" comment="systemd-32bit is &lt;234-lp152.31.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151694" version="1" comment="systemd-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652676" version="1" comment="systemd-bash-completion is &lt;234-lp152.31.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151695" version="1" comment="systemd-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652677" version="1" comment="systemd-container is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239132" version="1" comment="systemd-container is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652678" version="1" comment="systemd-coredump is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239133" version="1" comment="systemd-coredump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652679" version="1" comment="systemd-devel is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152582" version="1" comment="systemd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652680" version="1" comment="systemd-journal-remote is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625973" version="1" comment="systemd-journal-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652681" version="1" comment="systemd-logger is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151696" version="1" comment="systemd-logger is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652682" version="1" comment="systemd-mini is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152584" version="1" comment="systemd-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652683" version="1" comment="systemd-mini-bash-completion is &lt;234-lp152.31.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154204" version="1" comment="systemd-mini-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652684" version="1" comment="systemd-mini-container-mini is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239134" version="1" comment="systemd-mini-container-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652685" version="1" comment="systemd-mini-coredump-mini is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239135" version="1" comment="systemd-mini-coredump-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652686" version="1" comment="systemd-mini-devel is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152585" version="1" comment="systemd-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652687" version="1" comment="systemd-mini-sysvinit is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152586" version="1" comment="systemd-mini-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652688" version="1" comment="systemd-network is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625975" version="1" comment="systemd-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652689" version="1" comment="systemd-sysvinit is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151697" version="1" comment="systemd-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652690" version="1" comment="udev is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652691" version="1" comment="udev-mini is &lt;234-lp152.31.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152587" version="1" comment="udev-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613718" version="1" comment="libecpg6 is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613719" version="1" comment="libecpg6-32bit is &lt;12.6-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613720" version="1" comment="libpq5 is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613721" version="1" comment="libpq5-32bit is &lt;12.6-lp152.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613722" version="1" comment="postgresql12 is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613723" version="1" comment="postgresql12-contrib is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613724" version="1" comment="postgresql12-devel is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613725" version="1" comment="postgresql12-docs is &lt;12.6-lp152.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613726" version="1" comment="postgresql12-llvmjit is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613727" version="1" comment="postgresql12-plperl is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613728" version="1" comment="postgresql12-plpython is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613729" version="1" comment="postgresql12-pltcl is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613730" version="1" comment="postgresql12-server is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613731" version="1" comment="postgresql12-server-devel is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613732" version="1" comment="postgresql12-test is &lt;12.6-lp152.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613860" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-lp152.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613861" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-lp152.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613862" version="1" comment="libopenssl1_1 is &lt;1.1.1d-lp152.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613863" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-lp152.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613864" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-lp152.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613865" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-lp152.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613866" version="1" comment="openssl-1_1 is &lt;1.1.1d-lp152.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009613867" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-lp152.7.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615844" version="1" comment="tor is &lt;0.4.5.9-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626341" version="1" comment="go1.15 is &lt;1.15.14-lp152.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626342" version="1" comment="go1.15-doc is &lt;1.15.14-lp152.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626343" version="1" comment="go1.15-race is &lt;1.15.14-lp152.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626338" version="1" comment="go1.16 is &lt;1.16.6-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623998" version="1" comment="go1.16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626339" version="1" comment="go1.16-doc is &lt;1.16.6-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623999" version="1" comment="go1.16-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626340" version="1" comment="go1.16-race is &lt;1.16.6-lp152.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624000" version="1" comment="go1.16-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614565" version="1" comment="p7zip is &lt;16.02-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152637" version="1" comment="p7zip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614566" version="1" comment="p7zip-doc is &lt;16.02-lp152.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474267" version="1" comment="p7zip-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614567" version="1" comment="p7zip-full is &lt;16.02-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474268" version="1" comment="p7zip-full is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614589" version="1" comment="avahi is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614590" version="1" comment="avahi-autoipd is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614591" version="1" comment="avahi-compat-howl-devel is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614592" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614593" version="1" comment="avahi-lang is &lt;0.7-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614594" version="1" comment="avahi-mono is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614595" version="1" comment="avahi-utils is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614596" version="1" comment="avahi-utils-gtk is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614597" version="1" comment="libavahi-client3 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614598" version="1" comment="libavahi-client3-32bit is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614599" version="1" comment="libavahi-common3 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614600" version="1" comment="libavahi-common3-32bit is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614601" version="1" comment="libavahi-core7 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614602" version="1" comment="libavahi-devel is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614603" version="1" comment="libavahi-glib-devel is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614604" version="1" comment="libavahi-glib1 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614605" version="1" comment="libavahi-glib1-32bit is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614606" version="1" comment="libavahi-gobject-devel is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614607" version="1" comment="libavahi-gobject0 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614608" version="1" comment="libavahi-qt4-1 is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614609" version="1" comment="libavahi-qt4-devel is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614610" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614611" version="1" comment="libavahi-ui0 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614612" version="1" comment="libdns_sd is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614613" version="1" comment="libdns_sd-32bit is &lt;0.7-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614614" version="1" comment="libhowl0 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614615" version="1" comment="python3-avahi is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614616" version="1" comment="python3-avahi-gtk is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614617" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.7-lp152.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614163" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614164" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614165" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614166" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614167" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614030" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614031" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614032" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614033" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614034" version="1" comment="openexr is &lt;2.2.1-lp152.7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614035" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614036" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653895" version="1" comment="apache2 is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653896" version="1" comment="apache2-devel is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653897" version="1" comment="apache2-doc is &lt;2.4.43-lp152.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653898" version="1" comment="apache2-event is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653899" version="1" comment="apache2-example-pages is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653900" version="1" comment="apache2-prefork is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653901" version="1" comment="apache2-utils is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653902" version="1" comment="apache2-worker is &lt;2.4.43-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652692" version="1" comment="libQt5Svg5 is &lt;5.12.7-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152351" version="1" comment="libQt5Svg5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652693" version="1" comment="libQt5Svg5-32bit is &lt;5.12.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152352" version="1" comment="libQt5Svg5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652694" version="1" comment="libqt5-qtsvg-devel is &lt;5.12.7-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152458" version="1" comment="libqt5-qtsvg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652695" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.12.7-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152459" version="1" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652696" version="1" comment="libqt5-qtsvg-examples is &lt;5.12.7-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152460" version="1" comment="libqt5-qtsvg-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652697" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.12.7-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152461" version="1" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632514" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632515" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.16.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632516" version="1" comment="gstreamer-plugins-good-doc is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632517" version="1" comment="gstreamer-plugins-good-extra is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632518" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.16.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632519" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632520" version="1" comment="gstreamer-plugins-good-jack is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632521" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.16.3-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632522" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-lp152.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632523" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.16.3-lp152.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615069" version="1" comment="djvulibre is &lt;3.5.27-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615070" version="1" comment="djvulibre-doc is &lt;3.5.27-lp152.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615071" version="1" comment="libdjvulibre-devel is &lt;3.5.27-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615072" version="1" comment="libdjvulibre21 is &lt;3.5.27-lp152.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614778" version="1" comment="hivex is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476330" version="1" comment="hivex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614779" version="1" comment="hivex-devel is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476331" version="1" comment="hivex-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614780" version="1" comment="hivex-lang is &lt;1.3.14-lp152.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476332" version="1" comment="hivex-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614781" version="1" comment="libhivex0 is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476333" version="1" comment="libhivex0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614782" version="1" comment="ocaml-hivex is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476334" version="1" comment="ocaml-hivex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614783" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476335" version="1" comment="ocaml-hivex-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614784" version="1" comment="perl-Win-Hivex is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476336" version="1" comment="perl-Win-Hivex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614785" version="1" comment="python-hivex is &lt;1.3.14-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476337" version="1" comment="python-hivex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614942" version="1" comment="ceph is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614943" version="1" comment="ceph-base is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614944" version="1" comment="ceph-common is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614945" version="1" comment="ceph-fuse is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614946" version="1" comment="ceph-grafana-dashboards is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614947" version="1" comment="ceph-immutable-object-cache is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614948" version="1" comment="ceph-mds is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614949" version="1" comment="ceph-mgr is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614950" version="1" comment="ceph-mgr-cephadm is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614951" version="1" comment="ceph-mgr-dashboard is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614952" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614953" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614954" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614955" version="1" comment="ceph-mgr-modules-core is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614956" version="1" comment="ceph-mgr-rook is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614957" version="1" comment="ceph-mon is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614958" version="1" comment="ceph-osd is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614959" version="1" comment="ceph-prometheus-alerts is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614960" version="1" comment="ceph-radosgw is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614961" version="1" comment="ceph-test is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614962" version="1" comment="cephadm is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614963" version="1" comment="cephfs-shell is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614964" version="1" comment="libcephfs-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614965" version="1" comment="libcephfs2 is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614966" version="1" comment="librados-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614967" version="1" comment="librados2 is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614968" version="1" comment="libradospp-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614969" version="1" comment="librbd-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614970" version="1" comment="librbd1 is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614971" version="1" comment="librgw-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614972" version="1" comment="librgw2 is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614973" version="1" comment="python3-ceph-argparse is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614974" version="1" comment="python3-ceph-common is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614975" version="1" comment="python3-cephfs is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614976" version="1" comment="python3-rados is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614977" version="1" comment="python3-rbd is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614978" version="1" comment="python3-rgw is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614979" version="1" comment="rados-objclass-devel is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614980" version="1" comment="rbd-fuse is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614981" version="1" comment="rbd-mirror is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614982" version="1" comment="rbd-nbd is &lt;15.2.12.83+g528da226523-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615038" version="1" comment="389-ds is &lt;1.4.3.23~git0.f53d0132b-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615039" version="1" comment="389-ds-devel is &lt;1.4.3.23~git0.f53d0132b-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615040" version="1" comment="389-ds-snmp is &lt;1.4.3.23~git0.f53d0132b-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615041" version="1" comment="lib389 is &lt;1.4.3.23~git0.f53d0132b-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615042" version="1" comment="libsvrcore0 is &lt;1.4.3.23~git0.f53d0132b-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614735" version="1" comment="libxml2-2 is &lt;2.9.7-lp152.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614736" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp152.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614737" version="1" comment="libxml2-devel is &lt;2.9.7-lp152.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614738" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp152.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614739" version="1" comment="libxml2-doc is &lt;2.9.7-lp152.10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614740" version="1" comment="libxml2-tools is &lt;2.9.7-lp152.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614741" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp152.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614742" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp152.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614725" version="1" comment="liblz4-1 is &lt;1.8.0-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268961" version="1" comment="liblz4-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614726" version="1" comment="liblz4-1-32bit is &lt;1.8.0-lp152.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268962" version="1" comment="liblz4-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614727" version="1" comment="liblz4-devel is &lt;1.8.0-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268963" version="1" comment="liblz4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614728" version="1" comment="lz4 is &lt;1.8.0-lp152.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268964" version="1" comment="lz4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615093" version="1" comment="libxml2-2 is &lt;2.9.7-lp152.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615094" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp152.10.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615095" version="1" comment="libxml2-devel is &lt;2.9.7-lp152.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615096" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp152.10.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615097" version="1" comment="libxml2-doc is &lt;2.9.7-lp152.10.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615098" version="1" comment="libxml2-tools is &lt;2.9.7-lp152.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615099" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp152.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615100" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp152.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629545" version="1" comment="apache-commons-compress is &lt;1.21-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628199" version="1" comment="apache-commons-compress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629546" version="1" comment="apache-commons-compress-javadoc is &lt;1.21-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628200" version="1" comment="apache-commons-compress-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656916" version="1" comment="java-11-openjdk is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656917" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656918" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656919" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656920" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656921" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0-lp152.2.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656922" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656923" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0-lp152.2.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657887" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657888" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657889" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657890" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657891" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657892" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.312-lp152.2.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657893" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.312-lp152.2.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614992" version="1" comment="libpolkit0 is &lt;0.116-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151393" version="1" comment="libpolkit0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614993" version="1" comment="libpolkit0-32bit is &lt;0.116-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152720" version="1" comment="libpolkit0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614994" version="1" comment="polkit is &lt;0.116-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151394" version="1" comment="polkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614995" version="1" comment="polkit-devel is &lt;0.116-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151395" version="1" comment="polkit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614996" version="1" comment="polkit-doc is &lt;0.116-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152721" version="1" comment="polkit-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009614997" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-lp152.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151396" version="1" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615871" version="1" comment="tpm2.0-tools is &lt;4.1-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615872" version="1" comment="tpm2.0-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626193" version="1" comment="caribou is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624056" version="1" comment="caribou is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626194" version="1" comment="caribou-common is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624057" version="1" comment="caribou-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626195" version="1" comment="caribou-devel is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624058" version="1" comment="caribou-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626196" version="1" comment="caribou-gtk-module-common is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624059" version="1" comment="caribou-gtk-module-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626197" version="1" comment="caribou-gtk2-module is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624060" version="1" comment="caribou-gtk2-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626198" version="1" comment="caribou-gtk3-module is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624061" version="1" comment="caribou-gtk3-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626199" version="1" comment="caribou-lang is &lt;0.4.21-lp152.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624062" version="1" comment="caribou-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626200" version="1" comment="libcaribou0 is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624063" version="1" comment="libcaribou0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626201" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-lp152.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624064" version="1" comment="typelib-1_0-Caribou-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629522" version="1" comment="linuxptp is &lt;1.8+git65.g303b08c-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629547" version="1" comment="linuxptp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660277" version="1" comment="python2-pip is &lt;10.0.1-lp152.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660278" version="1" comment="python2-pip-wheel is &lt;10.0.1-lp152.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660279" version="1" comment="python3-pip is &lt;10.0.1-lp152.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660280" version="1" comment="python3-pip-wheel is &lt;10.0.1-lp152.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631503" version="1" comment="isync is &lt;1.3.6-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615150" version="1" comment="libhogweed4 is &lt;3.4.1-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615151" version="1" comment="libhogweed4-32bit is &lt;3.4.1-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615152" version="1" comment="libnettle-devel is &lt;3.4.1-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615153" version="1" comment="libnettle-devel-32bit is &lt;3.4.1-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615154" version="1" comment="libnettle6 is &lt;3.4.1-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615155" version="1" comment="libnettle6-32bit is &lt;3.4.1-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615156" version="1" comment="nettle is &lt;3.4.1-lp152.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615837" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615838" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615839" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615840" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615841" version="1" comment="openexr is &lt;2.2.1-lp152.7.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615842" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615843" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634501" version="1" comment="libipa_hbac-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152068" version="1" comment="libipa_hbac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634502" version="1" comment="libipa_hbac0 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152069" version="1" comment="libipa_hbac0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634503" version="1" comment="libnfsidmap-sss is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231788" version="1" comment="libnfsidmap-sss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634504" version="1" comment="libsss_certmap-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231789" version="1" comment="libsss_certmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634505" version="1" comment="libsss_certmap0 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634506" version="1" comment="libsss_idmap-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152070" version="1" comment="libsss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634507" version="1" comment="libsss_idmap0 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634508" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152071" version="1" comment="libsss_nss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634509" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634510" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231791" version="1" comment="libsss_simpleifp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634511" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231792" version="1" comment="libsss_simpleifp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634512" version="1" comment="python3-ipa_hbac is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231793" version="1" comment="python3-ipa_hbac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634513" version="1" comment="python3-sss-murmur is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231794" version="1" comment="python3-sss-murmur is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634514" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231795" version="1" comment="python3-sss_nss_idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634515" version="1" comment="python3-sssd-config is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231796" version="1" comment="python3-sssd-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634516" version="1" comment="sssd is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634517" version="1" comment="sssd-ad is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152077" version="1" comment="sssd-ad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634518" version="1" comment="sssd-common is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632505" version="1" comment="sssd-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634519" version="1" comment="sssd-dbus is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231797" version="1" comment="sssd-dbus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634520" version="1" comment="sssd-ipa is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152078" version="1" comment="sssd-ipa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634521" version="1" comment="sssd-krb5 is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152079" version="1" comment="sssd-krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634522" version="1" comment="sssd-krb5-common is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634523" version="1" comment="sssd-ldap is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634524" version="1" comment="sssd-proxy is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152080" version="1" comment="sssd-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634525" version="1" comment="sssd-tools is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152081" version="1" comment="sssd-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634526" version="1" comment="sssd-wbclient is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231798" version="1" comment="sssd-wbclient is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634527" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231799" version="1" comment="sssd-wbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634528" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-lp152.16.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231800" version="1" comment="sssd-winbind-idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634813" version="1" comment="hivex is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634814" version="1" comment="hivex-devel is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634815" version="1" comment="hivex-lang is &lt;1.3.14-lp152.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634816" version="1" comment="libhivex0 is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634817" version="1" comment="ocaml-hivex is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634818" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634819" version="1" comment="perl-Win-Hivex is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634820" version="1" comment="python-hivex is &lt;1.3.14-lp152.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632007" version="1" comment="go1.15 is &lt;1.15.15-lp152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632008" version="1" comment="go1.15-doc is &lt;1.15.15-lp152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632009" version="1" comment="go1.15-race is &lt;1.15.15-lp152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631855" version="1" comment="go1.16 is &lt;1.16.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631856" version="1" comment="go1.16-doc is &lt;1.16.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631857" version="1" comment="go1.16-race is &lt;1.16.7-lp152.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631593" version="1" comment="krb5 is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631594" version="1" comment="krb5-32bit is &lt;1.16.3-lp152.5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631595" version="1" comment="krb5-client is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631596" version="1" comment="krb5-devel is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631597" version="1" comment="krb5-devel-32bit is &lt;1.16.3-lp152.5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631598" version="1" comment="krb5-mini is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631599" version="1" comment="krb5-mini-devel is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631600" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631601" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631602" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631603" version="1" comment="krb5-server is &lt;1.16.3-lp152.5.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629524" version="1" comment="djvulibre is &lt;3.5.27-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629525" version="1" comment="djvulibre-doc is &lt;3.5.27-lp152.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629526" version="1" comment="libdjvulibre-devel is &lt;3.5.27-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629527" version="1" comment="libdjvulibre21 is &lt;3.5.27-lp152.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630432" version="1" comment="libvirt is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630433" version="1" comment="libvirt-admin is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630434" version="1" comment="libvirt-bash-completion is &lt;6.0.0-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630435" version="1" comment="libvirt-client is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630436" version="1" comment="libvirt-daemon is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630437" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630438" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630439" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630440" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630441" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630442" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630443" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630444" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630445" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630446" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630447" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630448" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630449" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630450" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630451" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630452" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630453" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630454" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630455" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630456" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630457" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630458" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630459" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630460" version="1" comment="libvirt-devel is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630461" version="1" comment="libvirt-devel-32bit is &lt;6.0.0-lp152.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630462" version="1" comment="libvirt-doc is &lt;6.0.0-lp152.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630463" version="1" comment="libvirt-libs is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630464" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630465" version="1" comment="libvirt-nss is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630466" version="1" comment="wireshark-plugin-libvirt is &lt;6.0.0-lp152.9.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660217" version="1" comment="fetchmail is &lt;6.4.22-lp152.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151334" version="1" comment="fetchmail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660218" version="1" comment="fetchmailconf is &lt;6.4.22-lp152.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631524" version="1" comment="fetchmailconf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632903" version="1" comment="kernel-debug is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632904" version="1" comment="kernel-debug-devel is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632905" version="1" comment="kernel-default is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632906" version="1" comment="kernel-default-base is &lt;5.3.18-lp152.92.2.lp152.8.42.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632907" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-lp152.92.2.lp152.8.42.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632908" version="1" comment="kernel-default-devel is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632909" version="1" comment="kernel-devel is &lt;5.3.18-lp152.92.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632910" version="1" comment="kernel-docs is &lt;5.3.18-lp152.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632911" version="1" comment="kernel-docs-html is &lt;5.3.18-lp152.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632912" version="1" comment="kernel-kvmsmall is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632913" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632914" version="1" comment="kernel-macros is &lt;5.3.18-lp152.92.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632915" version="1" comment="kernel-obs-build is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632916" version="1" comment="kernel-obs-qa is &lt;5.3.18-lp152.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632917" version="1" comment="kernel-preempt is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632918" version="1" comment="kernel-preempt-devel is &lt;5.3.18-lp152.92.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632919" version="1" comment="kernel-source is &lt;5.3.18-lp152.92.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632920" version="1" comment="kernel-source-vanilla is &lt;5.3.18-lp152.92.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632921" version="1" comment="kernel-syms is &lt;5.3.18-lp152.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632134" version="1" comment="389-ds is &lt;1.4.3.24~git13.7b705e743-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632135" version="1" comment="389-ds-devel is &lt;1.4.3.24~git13.7b705e743-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632136" version="1" comment="389-ds-snmp is &lt;1.4.3.24~git13.7b705e743-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632137" version="1" comment="lib389 is &lt;1.4.3.24~git13.7b705e743-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632138" version="1" comment="libsvrcore0 is &lt;1.4.3.24~git13.7b705e743-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654203" version="1" comment="libvirt is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654204" version="1" comment="libvirt-admin is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654205" version="1" comment="libvirt-bash-completion is &lt;6.0.0-lp152.9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654206" version="1" comment="libvirt-client is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654207" version="1" comment="libvirt-daemon is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654208" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654209" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654210" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654211" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-lp152.9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654212" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654213" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654214" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654215" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654216" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654217" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654218" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654219" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654220" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654221" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654222" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654223" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654224" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654225" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-lp152.9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654226" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654227" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654228" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654229" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654230" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-lp152.9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654231" version="1" comment="libvirt-devel is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654232" version="1" comment="libvirt-devel-32bit is &lt;6.0.0-lp152.9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654233" version="1" comment="libvirt-doc is &lt;6.0.0-lp152.9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654234" version="1" comment="libvirt-libs is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654235" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654236" version="1" comment="libvirt-nss is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654237" version="1" comment="wireshark-plugin-libvirt is &lt;6.0.0-lp152.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631332" version="1" comment="c-ares-devel is &lt;1.17.1+20200724-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631333" version="1" comment="c-ares-utils is &lt;1.17.1+20200724-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631334" version="1" comment="libcares2 is &lt;1.17.1+20200724-lp152.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631335" version="1" comment="libcares2-32bit is &lt;1.17.1+20200724-lp152.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631777" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-lp152.7.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631778" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-lp152.7.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631779" version="1" comment="libopenssl1_1 is &lt;1.1.1d-lp152.7.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631780" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-lp152.7.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631781" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-lp152.7.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631782" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-lp152.7.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631783" version="1" comment="openssl-1_1 is &lt;1.1.1d-lp152.7.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631784" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-lp152.7.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632807" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632808" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp152.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632717" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-lp152.7.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632718" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-lp152.7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632809" version="1" comment="libopenssl10 is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632810" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632811" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp152.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632812" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632813" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp152.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632814" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632815" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp152.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632719" version="1" comment="libopenssl1_1 is &lt;1.1.1d-lp152.7.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632720" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-lp152.7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632721" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-lp152.7.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632722" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-lp152.7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632816" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632817" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp152.8.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632818" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp152.8.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632723" version="1" comment="openssl-1_1 is &lt;1.1.1d-lp152.7.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632724" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-lp152.7.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654443" version="1" comment="qemu is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654444" version="1" comment="qemu-arm is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654445" version="1" comment="qemu-audio-alsa is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654446" version="1" comment="qemu-audio-pa is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654447" version="1" comment="qemu-audio-sdl is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654448" version="1" comment="qemu-block-curl is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654449" version="1" comment="qemu-block-dmg is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654450" version="1" comment="qemu-block-gluster is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654451" version="1" comment="qemu-block-iscsi is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654452" version="1" comment="qemu-block-nfs is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654453" version="1" comment="qemu-block-rbd is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654454" version="1" comment="qemu-block-ssh is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654455" version="1" comment="qemu-extra is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654456" version="1" comment="qemu-guest-agent is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654457" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp152.9.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654458" version="1" comment="qemu-ksm is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654459" version="1" comment="qemu-kvm is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654460" version="1" comment="qemu-lang is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654461" version="1" comment="qemu-linux-user is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654462" version="1" comment="qemu-microvm is &lt;4.2.1-lp152.9.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654463" version="1" comment="qemu-ppc is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654464" version="1" comment="qemu-s390 is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654465" version="1" comment="qemu-seabios is &lt;1.12.1+-lp152.9.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654466" version="1" comment="qemu-sgabios is &lt;8-lp152.9.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654467" version="1" comment="qemu-testsuite is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654468" version="1" comment="qemu-tools is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654469" version="1" comment="qemu-ui-curses is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654470" version="1" comment="qemu-ui-gtk is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654471" version="1" comment="qemu-ui-sdl is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654472" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654473" version="1" comment="qemu-vgabios is &lt;1.12.1+-lp152.9.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654474" version="1" comment="qemu-vhost-user-gpu is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654475" version="1" comment="qemu-x86 is &lt;4.2.1-lp152.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653835" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653836" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-lp152.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653837" version="1" comment="python is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653838" version="1" comment="python-32bit is &lt;2.7.18-lp152.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653839" version="1" comment="python-base is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653840" version="1" comment="python-base-32bit is &lt;2.7.18-lp152.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653841" version="1" comment="python-curses is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653842" version="1" comment="python-demo is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653843" version="1" comment="python-devel is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653844" version="1" comment="python-doc is &lt;2.7.18-lp152.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653845" version="1" comment="python-doc-pdf is &lt;2.7.18-lp152.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653846" version="1" comment="python-gdbm is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653847" version="1" comment="python-idle is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653848" version="1" comment="python-tk is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653849" version="1" comment="python-xml is &lt;2.7.18-lp152.3.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653904" version="1" comment="libblkid-devel is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151786" version="1" comment="libblkid-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653905" version="1" comment="libblkid-devel-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152861" version="1" comment="libblkid-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653906" version="1" comment="libblkid-devel-static is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152862" version="1" comment="libblkid-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653907" version="1" comment="libblkid1 is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151787" version="1" comment="libblkid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653908" version="1" comment="libblkid1-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151788" version="1" comment="libblkid1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653909" version="1" comment="libfdisk-devel is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154254" version="1" comment="libfdisk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653910" version="1" comment="libfdisk-devel-static is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154255" version="1" comment="libfdisk-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653911" version="1" comment="libfdisk1 is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154114" version="1" comment="libfdisk1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653912" version="1" comment="libmount-devel is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152863" version="1" comment="libmount-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653913" version="1" comment="libmount-devel-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152864" version="1" comment="libmount-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653914" version="1" comment="libmount-devel-static is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152865" version="1" comment="libmount-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653915" version="1" comment="libmount1 is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151789" version="1" comment="libmount1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653916" version="1" comment="libmount1-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151790" version="1" comment="libmount1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653917" version="1" comment="libsmartcols-devel is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152866" version="1" comment="libsmartcols-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653918" version="1" comment="libsmartcols-devel-static is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152867" version="1" comment="libsmartcols-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653919" version="1" comment="libsmartcols1 is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151791" version="1" comment="libsmartcols1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653920" version="1" comment="libuuid-devel is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151792" version="1" comment="libuuid-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653921" version="1" comment="libuuid-devel-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152868" version="1" comment="libuuid-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653922" version="1" comment="libuuid-devel-static is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152869" version="1" comment="libuuid-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653923" version="1" comment="libuuid1 is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151793" version="1" comment="libuuid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653924" version="1" comment="libuuid1-32bit is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151794" version="1" comment="libuuid1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653925" version="1" comment="python3-libmount is &lt;2.33.2-lp152.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652924" version="1" comment="python3-libmount is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653926" version="1" comment="util-linux is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151795" version="1" comment="util-linux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653927" version="1" comment="util-linux-lang is &lt;2.33.2-lp152.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151796" version="1" comment="util-linux-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653928" version="1" comment="util-linux-systemd is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151797" version="1" comment="util-linux-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653929" version="1" comment="uuidd is &lt;2.33.2-lp152.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152871" version="1" comment="uuidd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653808" version="1" comment="krb5 is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653809" version="1" comment="krb5-32bit is &lt;1.16.3-lp152.5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653810" version="1" comment="krb5-client is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653811" version="1" comment="krb5-devel is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653812" version="1" comment="krb5-devel-32bit is &lt;1.16.3-lp152.5.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653813" version="1" comment="krb5-mini is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653814" version="1" comment="krb5-mini-devel is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653815" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653816" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653817" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653818" version="1" comment="krb5-server is &lt;1.16.3-lp152.5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633115" version="1" comment="ghostscript is &lt;9.52-lp152.2.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633116" version="1" comment="ghostscript-devel is &lt;9.52-lp152.2.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633117" version="1" comment="ghostscript-mini is &lt;9.52-lp152.2.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633118" version="1" comment="ghostscript-mini-devel is &lt;9.52-lp152.2.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633119" version="1" comment="ghostscript-x11 is &lt;9.52-lp152.2.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633120" version="1" comment="libspectre-devel is &lt;0.2.8-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236536" version="1" comment="libspectre-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633121" version="1" comment="libspectre1 is &lt;0.2.8-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236537" version="1" comment="libspectre1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651936" version="1" comment="chromedriver is &lt;94.0.4606.81-lp152.2.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651937" version="1" comment="chromium is &lt;94.0.4606.81-lp152.2.132.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653871" version="1" comment="opera is &lt;80.0.4170.63-lp152.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653718" version="1" comment="chromedriver is &lt;95.0.4638.54-lp152.2.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653719" version="1" comment="chromium is &lt;95.0.4638.54-lp152.2.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657140" version="1" comment="opera is &lt;81.0.4196.31-lp152.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654476" version="1" comment="chromedriver is &lt;95.0.4638.69-lp152.2.138.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654477" version="1" comment="chromium is &lt;95.0.4638.69-lp152.2.138.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661914" version="1" comment="chromedriver is &lt;96.0.4664.110-lp152.2.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661915" version="1" comment="chromium is &lt;96.0.4664.110-lp152.2.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631867" version="1" comment="cpio is &lt;2.12-lp152.5.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151389" version="1" comment="cpio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631868" version="1" comment="cpio-lang is &lt;2.12-lp152.5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151390" version="1" comment="cpio-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631869" version="1" comment="cpio-mt is &lt;2.12-lp152.5.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177165" version="1" comment="cpio-mt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653851" version="1" comment="go1.16 is &lt;1.16.9-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653852" version="1" comment="go1.16-doc is &lt;1.16.9-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653853" version="1" comment="go1.16-race is &lt;1.16.9-lp152.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631336" version="1" comment="tor is &lt;0.4.6.7-lp152.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653781" version="1" comment="xstream is &lt;1.4.18-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653782" version="1" comment="xstream-benchmark is &lt;1.4.18-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653783" version="1" comment="xstream-javadoc is &lt;1.4.18-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653784" version="1" comment="xstream-parent is &lt;1.4.18-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651575" version="1" comment="go1.16 is &lt;1.16.8-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651576" version="1" comment="go1.16-doc is &lt;1.16.8-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651577" version="1" comment="go1.16-race is &lt;1.16.8-lp152.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659199" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp152.7.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659200" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp152.7.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659201" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp152.7.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659202" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp152.7.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659203" version="1" comment="openexr is &lt;2.2.1-lp152.7.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659204" version="1" comment="openexr-devel is &lt;2.2.1-lp152.7.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659205" version="1" comment="openexr-doc is &lt;2.2.1-lp152.7.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634488" version="1" comment="grilo-devel is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633964" version="1" comment="grilo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634489" version="1" comment="grilo-lang is &lt;0.3.12-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633965" version="1" comment="grilo-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634490" version="1" comment="grilo-tools is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633966" version="1" comment="grilo-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634491" version="1" comment="libgrilo-0_3-0 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633967" version="1" comment="libgrilo-0_3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634492" version="1" comment="libgrlnet-0_3-0 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633968" version="1" comment="libgrlnet-0_3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634493" version="1" comment="libgrlpls-0_3-0 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633969" version="1" comment="libgrlpls-0_3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634494" version="1" comment="typelib-1_0-Grl-0_3 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633970" version="1" comment="typelib-1_0-Grl-0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634495" version="1" comment="typelib-1_0-GrlNet-0_3 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633971" version="1" comment="typelib-1_0-GrlNet-0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634496" version="1" comment="typelib-1_0-GrlPls-0_3 is &lt;0.3.12-lp152.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633972" version="1" comment="typelib-1_0-GrlPls-0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653821" version="1" comment="libncurses5 is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158856" version="1" comment="libncurses5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653822" version="1" comment="libncurses5-32bit is &lt;6.1-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158857" version="1" comment="libncurses5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653823" version="1" comment="libncurses6 is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158858" version="1" comment="libncurses6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653824" version="1" comment="libncurses6-32bit is &lt;6.1-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158859" version="1" comment="libncurses6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653825" version="1" comment="ncurses-devel is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158861" version="1" comment="ncurses-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653826" version="1" comment="ncurses-devel-32bit is &lt;6.1-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158862" version="1" comment="ncurses-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653827" version="1" comment="ncurses-utils is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158863" version="1" comment="ncurses-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653828" version="1" comment="ncurses5-devel is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241509" version="1" comment="ncurses5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653829" version="1" comment="ncurses5-devel-32bit is &lt;6.1-lp152.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241510" version="1" comment="ncurses5-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653830" version="1" comment="tack is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158864" version="1" comment="tack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653831" version="1" comment="terminfo is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158865" version="1" comment="terminfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653832" version="1" comment="terminfo-base is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158866" version="1" comment="terminfo-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653833" version="1" comment="terminfo-iterm is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241511" version="1" comment="terminfo-iterm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653834" version="1" comment="terminfo-screen is &lt;6.1-lp152.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241512" version="1" comment="terminfo-screen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659510" version="1" comment="libwireshark14 is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659511" version="1" comment="libwiretap11 is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659512" version="1" comment="libwsutil12 is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659513" version="1" comment="wireshark is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659514" version="1" comment="wireshark-devel is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659515" version="1" comment="wireshark-ui-qt is &lt;3.4.10-lp152.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660082" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660083" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660084" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660085" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660086" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661691" version="1" comment="xorg-x11-server is &lt;1.20.3-lp152.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661692" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp152.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661693" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp152.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661694" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp152.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661695" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp152.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651589" version="1" comment="git is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651590" version="1" comment="git-arch is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651591" version="1" comment="git-core is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651592" version="1" comment="git-credential-gnome-keyring is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651593" version="1" comment="git-credential-libsecret is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651594" version="1" comment="git-cvs is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651595" version="1" comment="git-daemon is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651596" version="1" comment="git-doc is &lt;2.26.2-lp152.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651597" version="1" comment="git-email is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651598" version="1" comment="git-gui is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651599" version="1" comment="git-p4 is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651600" version="1" comment="git-svn is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651601" version="1" comment="git-web is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651602" version="1" comment="gitk is &lt;2.26.2-lp152.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651154" version="1" comment="haproxy is &lt;2.0.14-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238038" version="1" comment="haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661704" version="1" comment="log4j12 is &lt;1.2.17-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660223" version="1" comment="log4j12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661705" version="1" comment="log4j12-javadoc is &lt;1.2.17-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660224" version="1" comment="log4j12-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661706" version="1" comment="log4j12-manual is &lt;1.2.17-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660225" version="1" comment="log4j12-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661707" version="1" comment="log4j12-mini is &lt;1.2.17-lp152.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661801" version="1" comment="log4j12-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653775" version="1" comment="flatpak is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653776" version="1" comment="flatpak-devel is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653777" version="1" comment="flatpak-zsh-completion is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653778" version="1" comment="libflatpak0 is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653779" version="1" comment="system-user-flatpak is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653780" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.5-lp152.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660993" version="1" comment="nextcloud is &lt;20.0.14-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660994" version="1" comment="nextcloud-apache is &lt;20.0.14-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659943" version="1" comment="nim is &lt;1.2.12-lp152.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659210" version="1" comment="go1.16 is &lt;1.16.10-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659211" version="1" comment="go1.16-doc is &lt;1.16.10-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659212" version="1" comment="go1.16-race is &lt;1.16.10-lp152.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653767" version="1" comment="strongswan is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153116" version="1" comment="strongswan is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653768" version="1" comment="strongswan-doc is &lt;5.8.2-lp152.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153117" version="1" comment="strongswan-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653769" version="1" comment="strongswan-hmac is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153118" version="1" comment="strongswan-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653770" version="1" comment="strongswan-ipsec is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153119" version="1" comment="strongswan-ipsec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653771" version="1" comment="strongswan-libs0 is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153120" version="1" comment="strongswan-libs0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653772" version="1" comment="strongswan-mysql is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153121" version="1" comment="strongswan-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653773" version="1" comment="strongswan-nm is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153122" version="1" comment="strongswan-nm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653774" version="1" comment="strongswan-sqlite is &lt;5.8.2-lp152.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153123" version="1" comment="strongswan-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657381" version="1" comment="barrier is &lt;2.4.0-lp152.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657382" version="1" comment="barrier is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653894" version="1" comment="mailman is &lt;2.1.35-lp152.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656676" version="1" comment="libtinyxml0 is &lt;2.6.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654662" version="1" comment="libtinyxml0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656677" version="1" comment="tinyxml-devel is &lt;2.6.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654663" version="1" comment="tinyxml-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656678" version="1" comment="tinyxml-docs is &lt;2.6.2-lp152.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654664" version="1" comment="tinyxml-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654238" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654239" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.4-lp152.2.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654240" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654241" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.4-lp152.2.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654242" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-lp152.2.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654243" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654244" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654245" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654246" version="1" comment="webkit-jsc-4 is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654247" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654248" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654249" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.4-lp152.2.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659459" version="1" comment="python-Babel-doc is &lt;2.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659238" version="1" comment="python-Babel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659460" version="1" comment="python2-Babel is &lt;2.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659239" version="1" comment="python2-Babel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659461" version="1" comment="python3-Babel is &lt;2.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659240" version="1" comment="python3-Babel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659462" version="1" comment="python3-Babel-doc is &lt;2.8.0-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659241" version="1" comment="python3-Babel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659466" version="1" comment="libfreebl3 is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659467" version="1" comment="libfreebl3-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659468" version="1" comment="libfreebl3-hmac is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659469" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659470" version="1" comment="libsoftokn3 is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659471" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659472" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659473" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659474" version="1" comment="mozilla-nss is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659475" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659476" version="1" comment="mozilla-nss-certs is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659477" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659478" version="1" comment="mozilla-nss-devel is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659479" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659480" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-lp152.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659481" version="1" comment="mozilla-nss-tools is &lt;3.68.1-lp152.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659598" version="1" comment="MozillaFirefox is &lt;91.4.0-lp152.2.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659599" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.4.0-lp152.2.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659600" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-lp152.2.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659601" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-lp152.2.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659602" version="1" comment="MozillaFirefox-translations-other is &lt;91.4.0-lp152.2.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659516" version="1" comment="gmp-devel is &lt;6.1.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281482" version="1" comment="gmp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659517" version="1" comment="gmp-devel-32bit is &lt;6.1.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281483" version="1" comment="gmp-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659518" version="1" comment="libgmp10 is &lt;6.1.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281484" version="1" comment="libgmp10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659519" version="1" comment="libgmp10-32bit is &lt;6.1.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281485" version="1" comment="libgmp10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659520" version="1" comment="libgmpxx4 is &lt;6.1.2-lp152.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281486" version="1" comment="libgmpxx4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659521" version="1" comment="libgmpxx4-32bit is &lt;6.1.2-lp152.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281487" version="1" comment="libgmpxx4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661853" version="1" comment="runc is &lt;1.0.3-lp152.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660985" version="1" comment="disruptor is &lt;3.4.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660171" version="1" comment="disruptor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660986" version="1" comment="disruptor-javadoc is &lt;3.4.4-lp152.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660172" version="1" comment="disruptor-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660987" version="1" comment="jakarta-servlet is &lt;5.0.0-lp152.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660173" version="1" comment="jakarta-servlet is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660988" version="1" comment="jakarta-servlet-javadoc is &lt;5.0.0-lp152.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660174" version="1" comment="jakarta-servlet-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660989" version="1" comment="log4j is &lt;2.16.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275808" version="1" comment="log4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660990" version="1" comment="log4j-javadoc is &lt;2.16.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275809" version="1" comment="log4j-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660991" version="1" comment="log4j-jcl is &lt;2.16.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659607" version="1" comment="log4j-jcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660992" version="1" comment="log4j-slf4j is &lt;2.16.0-lp152.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659608" version="1" comment="log4j-slf4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661708" version="1" comment="logback is &lt;1.2.8-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660226" version="1" comment="logback is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661709" version="1" comment="logback-access is &lt;1.2.8-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660227" version="1" comment="logback-access is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661710" version="1" comment="logback-examples is &lt;1.2.8-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660228" version="1" comment="logback-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661711" version="1" comment="logback-javadoc is &lt;1.2.8-lp152.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660229" version="1" comment="logback-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662414" version="1" comment="privoxy is &lt;3.0.33-lp152.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662415" version="1" comment="privoxy-doc is &lt;3.0.33-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661854" version="1" comment="go1.16 is &lt;1.16.12-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661855" version="1" comment="go1.16-doc is &lt;1.16.12-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661856" version="1" comment="go1.16-race is &lt;1.16.12-lp152.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662447" version="1" comment="log4j is &lt;2.17.0-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662448" version="1" comment="log4j-javadoc is &lt;2.17.0-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662449" version="1" comment="log4j-jcl is &lt;2.17.0-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662450" version="1" comment="log4j-slf4j is &lt;2.17.0-lp152.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662416" version="1" comment="c-toxcore is &lt;0.2.13-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662417" version="1" comment="c-toxcore is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662418" version="1" comment="c-toxcore-daemon is &lt;0.2.13-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662419" version="1" comment="c-toxcore-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662420" version="1" comment="c-toxcore-devel is &lt;0.2.13-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662421" version="1" comment="c-toxcore-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662422" version="1" comment="libtoxcore2 is &lt;0.2.13-lp152.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662423" version="1" comment="libtoxcore2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661687" version="1" comment="log4j is &lt;2.17.0-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661688" version="1" comment="log4j-javadoc is &lt;2.17.0-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661689" version="1" comment="log4j-jcl is &lt;2.17.0-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661690" version="1" comment="log4j-slf4j is &lt;2.17.0-lp152.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156332"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>froxlor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-theme-exfoliation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gvedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-smyrna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base-rebuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ssh-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-csharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-mini-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-saltboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin-Plugin-iXhash2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-xtensa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-virt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-piechart-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-status-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libBasicUsageEnvironment1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libUsageEnvironment3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysofa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-spell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaria2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-20_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-fuse_client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysdig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysdig-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysdig-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-xendomains-wait-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dfu-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-java-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-phpfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minidlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-librelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-codec-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-vdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsoap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsoap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsoap-2_8_102</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvptx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql11-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-24-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Camel-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBackend-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ECal-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataCal-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServerUI-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alpine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_1_2-gnu-openmpi2-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blueman-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-sendto-blueman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moinmoin-wiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kf5-mediainfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediainfo0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mediainfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mediainfo-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaxutil7_0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pkix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugin-pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpipewire-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libjack-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libpulse-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-plugins-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetpan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetpan20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftinspect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftmulti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftvalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Pdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PdfWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtpdf-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-dnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-overlayfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-doc-zh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-emmentaler-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-fonts-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilypond-texgy-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firejail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-godbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-docgenerator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-groovydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-groovysh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-jsr223</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-nio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-imageio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-cbindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingacli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-HTMLPurifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-JShrink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-Parsedown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-dompdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-lessphp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-zf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-Icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fossil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-djangorestframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-grafana-dashboards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-immutable-object-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-k8sevents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-rook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-osd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-prometheus-alerts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-radosgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-x11vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solo-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-continuation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-javax-websocket-client-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-javax-websocket-server-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jndi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-minimal-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-openid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util-ajax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-contributor-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-contributor-tools-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-equinox-osgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-equinox-osgi-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jdt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jdt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-p2-discovery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-p2-discovery-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-pde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-pde-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-platform-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-swt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-swt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-tests-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>civetweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>civetweb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcivetweb-cpp1_15_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcivetweb1_15_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pngcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxlsreader8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bottle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openscad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blosc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblosc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postsrsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aom-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-autoar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-gtk-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoar-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoarGtk-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bgzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htsfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tabix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmod2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coturn-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mininews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-oslogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-oslogin-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlienc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlienc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getdata-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getdata-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libf95getdata7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfgetdata6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgetdata++7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgetdata8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-getdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-getdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>isync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-OSTree-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-poms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing-relaysrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-django-registration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-RandomAccess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Image-ExifTool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nemo-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-dolphin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activerecord-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch-ethercodes-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-convert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-nmcompat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-hh2serial-gps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-iospm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-pptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-tist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-wireguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfluidsynth1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfluidsynth1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haserl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>umoci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-handler-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhiredis0_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prosody</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-HyperKitty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUPnP-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-container-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-coredump-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk-module-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk2-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrilo-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlnet-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlpls-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Grl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlNet-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlPls-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>barrier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyxml0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>disruptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>disruptor-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-servlet-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-access</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtoxcore2</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-lp152.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-lp152.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-lp152.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.06.0.1-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.52-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.94.2-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-lp152.9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.25.5-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.48-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.41-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.41-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.02-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-lp152.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.102.1.lp152.8.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-lp152.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-lp152.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.3-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1c-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.29-lp152.2.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20210112-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1590413773.a959db7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.15-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-lp152.7.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.05-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-lp152.6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-lp152.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-lp152.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-lp152.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.05.22-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0+git.1461714863.10636a4-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp152.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp152.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.69.1.lp152.8.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.26.2.lp152.8.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp152.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp152.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.06.28-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.66-lp152.2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.8.22-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-lp152.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8_k5.3.18_lp152.36-lp152.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8-lp152.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8_k5.3.18_lp152.36-lp152.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.1_k5.3.18_lp152.36-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.22~1+git.fe2b5983-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28_k5.3.18_lp152.36-lp152.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-lp152.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44_k5.3.18_lp152.36-lp152.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.10-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4.2+git20200318.49e98ff-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-lp152.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5_k5.3.18_lp152.36-lp152.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200106_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.10-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.10_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9_k5.3.18_lp152.36-lp152.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.44.1.lp152.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_04-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_04-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_04-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.01-lp152.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.30-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.34-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.50.1.lp152.8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.66.2.lp152.8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-lp152.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-lp152.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.10-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-lp152.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.33.1.lp152.8.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp152.9.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp152.9.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11.1-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11.1-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp152.2.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp152.2.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp152.2.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.5-lp152.2.10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.5-lp152.2.10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.5-lp152.2.10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.102-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.102-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp152.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp152.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp152.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-lp152.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.52-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-lp152.18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-lp152.18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-lp152.3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.73-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.14-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201120-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20201120-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.41.1.lp152.8.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-lp152.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-lp152.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-lp152.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-lp152.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-lp152.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-lp152.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_lp152.41-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.14-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.14-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.14_k5.3.18_lp152.41-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-lp152.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-lp152.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-lp152.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-lp152.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-lp152.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.17-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.17-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-lp152.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-lp152.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22.1-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22.1-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.15_ce-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.15_ce-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2908_55e924b8a842-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.11-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.08-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.08-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.57.1.lp152.8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.9-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-lp152.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-lp152.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-lp152.2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:85.0.4183.102-lp152.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:71.0.3770.228-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:85.0.4183.121-lp152.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.75-lp152.2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1807-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.141-lp152.2.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.0.3856.344-lp152.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-lp152.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-lp152.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.111-lp152.2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp152.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:72.0.3815.320-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.183-lp152.2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.198-lp152.2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:72.0.3815.400-lp152.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.88-lp152.2.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.0.3856.284-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-lp152.2.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-lp152.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-lp152.2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-lp152.2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:88.0.4324.96-lp152.2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-lp152.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-lp152.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.04.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.04.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-lp152.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-lp152.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.15-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200727-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-lp152.2.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-lp152.2.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.64.4-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.8-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.5-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.5-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.21-lp152.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-lp152.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-lp152.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-lp152.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-lp152.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.96-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-lp152.2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.9-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.78.1.lp152.8.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.81.1.lp152.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.04.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.04.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp152.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp152.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.63.1.lp152.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_08-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_08-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_08-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.5.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4+20200616.2deceaa3a-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4+20200616.2deceaa3a-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.5.667+g1a579d5bf2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.5.667+g1a579d5bf2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.72.1.lp152.8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.9.83+g4275378de0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.9.83+g4275378de0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-lp152.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-lp152.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-lp152.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.54.1.lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.313.d4e302805e1-lp152.3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.313.d4e302805e1-lp152.3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.313.d4e302805e1-lp152.3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.0-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.04.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.2-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-lp152.2.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.35-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_04-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_04-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_04-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_10-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_10-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_10-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-lp152.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.8.80+g1f4b6229ca-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.8.80+g1f4b6229ca-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-lp152.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-lp152.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-lp152.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:89.0.4389.72-lp152.2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp152.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp152.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.12-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.5-lp152.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.13-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.05-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.47-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.5-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0+git.1611141202.2fe6369e-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1+20210702.4e0ee8fb-lp152.4.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3+git.1614684118.af555ad9-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.19~git0.bef0b5bed-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.10.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.21-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-lp152.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.95.1.lp152.8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13.1-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.0.3618.104-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:83.0.4103.116-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:69.0.3686.49-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.89-lp152.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:70.0.3728.71-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.105-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:70.0.3728.133-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.125-lp152.2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.135-lp152.2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-lp152.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-lp152.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp152.14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp152.14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-lp152.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-lp152.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.11-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201118-lp152.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp152.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp152.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp152.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp152.2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp152.2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp152.2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.106.1.lp152.8.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.57-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.57-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp152.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp152.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-lp152.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-lp152.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.32-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.32-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.11.83+g8a15f484c2-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.11.83+g8a15f484c2-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp152.12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.20-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.20-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.20_k5.3.18_lp152.72-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:88.0.4324.146-lp152.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:88.0.4324.150-lp152.2.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:74.0.3911.203-lp152.2.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:89.0.4389.90-lp152.2.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:75.0.3969.171-lp152.2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:89.0.4389.114-lp152.2.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:90.0.4430.93-lp152.2.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:89.0.4389.128-lp152.2.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.4017.94-lp152.2.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.77-lp152.2.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.4017.107-lp152.2.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.8-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc93-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.13-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22-lp152.2.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22-lp152.2.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22_k5.3.18_lp152.75-lp152.2.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-lp152.2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-lp152.2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.87.1.lp152.8.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-lp152.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-lp152.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.25-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.84.1.lp152.8.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-lp152.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-lp152.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-lp152.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.8-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-lp152.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-lp152.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-lp152.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-lp152.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp152.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-lp152.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-lp152.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-lp152.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-lp152.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-lp152.2.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-lp152.2.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-lp152.2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-lp152.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-lp152.2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.1-lp152.2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.26-lp152.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.26-lp152.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.26_k5.3.18_lp152.84-lp152.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28-lp152.2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28-lp152.2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28_k5.3.18_lp152.95-lp152.2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6.P1-lp152.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp152.14.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp152.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp152.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-lp152.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:330-lp152.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp152.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.7-lp152.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp152.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-lp152.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.21-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1627546504.96a0b3e-lp152.2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.1-lp152.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5.7-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-lp152.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.11-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.11-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-lp152.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-lp152.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-lp152.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-lp152.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-lp152.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-lp152.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-lp152.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-lp152.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-lp152.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.36-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.75.1.lp152.8.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.22-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.17-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-lp152.2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-lp152.2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-lp152.2.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-lp152.2.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-lp152.2.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-lp152.2.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-lp152.2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp152.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32.0+git.20200301T004003.e7bab0025f-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0+20210305.9db5c9a8-lp152.4.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:90.0.4430.212-lp152.2.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.4017.154-lp152.2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.164-lp152.2.113.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.4054.277-lp152.2.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.101-lp152.2.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.4054.146-lp152.2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.114-lp152.2.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0.4515.131-lp152.2.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.4093.147-lp152.2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0.4515.159-lp152.2.122.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.4093.184-lp152.2.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93.0.4577.82-lp152.2.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.4143.22-lp152.2.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.4143.50-lp152.2.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp152.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-lp152.2.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-lp152.2.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.14-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-lp152.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-lp152.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp152.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-lp152.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.12-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-lp152.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.9-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.13-lp152.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp152.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp152.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp152.26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp152.31.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp152.31.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp152.31.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6-lp152.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5.9-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-lp152.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-lp152.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.23~git0.f53d0132b-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp152.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp152.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-lp152.2.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-lp152.2.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-lp152.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-lp152.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-lp152.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8+git65.g303b08c-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-lp152.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp152.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-lp152.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-lp152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-lp152.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp152.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.22-lp152.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.92.2.lp152.8.42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-lp152.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.24~git13.7b705e743-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-lp152.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1+20200724-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1+20200724-lp152.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp152.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-lp152.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp152.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp152.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-lp152.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp152.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-lp152.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-lp152.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp152.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-lp152.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:94.0.4606.81-lp152.2.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.4170.63-lp152.2.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.54-lp152.2.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4196.31-lp152.2.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.69-lp152.2.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:96.0.4664.110-lp152.2.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-lp152.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-lp152.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-lp152.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.7-lp152.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-lp152.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp152.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-lp152.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-lp152.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp152.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-lp152.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.14-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-lp152.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-lp152.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-lp152.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-lp152.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.35-lp152.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-lp152.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-lp152.2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-lp152.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-lp152.2.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-lp152.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-lp152.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-lp152.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-lp152.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-lp152.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-lp152.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.33-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.33-lp152.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-lp152.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-lp152.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.13-lp152.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-lp152.3.12.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
